


default search action
VizSEC 2018: Berlin, Germany
- Diane Staheli, Celeste Lyn Paul, Jörn Kohlhammer, Daniel M. Best, Stoney Trent, Nicolas Prigent, Robert Gove, Graig Sauer:

15th IEEE Symposium on Visualization for Cyber Security, VizSec 2018, Berlin, Germany, October 22, 2018. IEEE 2018, ISBN 978-1-5386-8194-7 - Robert Gove

, Lauren Deason:
Visualizing Automatically Detected Periodic Network Activity. 1-8 - Jia-Kai Chou, Chris Bryan, Jing Li, Kwan-Liu Ma:

An Empirical Study on Perceptually Masking Privacy in Graph Visualizations. 1-8 - Alex Ulmer, Marija Schufrin, David Sessler, Jörn Kohlhammer:

Visual-Interactive Identification of Anomalous IP-Block Behavior Using Geo-IP Data. 1-8 - Georgios Bakirtzis

, Brandon J. Simon, Cody H. Fleming, Carl R. Elks
:
Looking for a Black Cat in a Dark Room: Security Visualization for Cyber-Physical System Design and Analysis. 1-8 - Marco Angelini

, Graziano Blasilli
, Pietro Borrello
, Emilio Coppa
, Daniele Cono D'Elia
, Serena Ferracci, Simone Lenti
, Giuseppe Santucci:
ROPMate: Visually Assisting the Creation of ROP-based Exploits. 1-8 - Eric Krokos, Alexander Rowden

, Kirsten Whitley
, Amitabh Varshney
:
Visual Analytics for Root DNS Data. 1-8 - Dustin Lockhart Arendt, Lyndsey R. Franklin

, Fumeng Yang, Brooke R. Brisbois, Ryan R. LaMothe:
Crush Your Data with ViC2ES Then CHISSL Away. 1-8 - Siming Chen, Shuai Chen

, Natalia V. Andrienko, Gennady L. Andrienko, Phong H. Nguyen, Cagatay Turkay
, Olivier Thonnard, Xiaoru Yuan:
User Behavior Map: Visual Exploration for Cyber Security Session Data. 1-4 - Bram C. M. Cappers, Paulus N. Meessen

, Sandro Etalle, Jarke J. van Wijk:
Eventpad: Rapid Malware Analysis and Reverse Engineering using Visual Analytics. 1-8 - Awalin Sopan, Matthew Berninger, Murali Mulakaluri, Raj Katakam:

Building a Machine Learning Model for the SOC, by the Input from the SOC, and Analyzing it for the SOC. 1-8 - Yifan Yang, John P. Collomosse, Arthi Kanchana Manohar, Jo Briggs

, Jamie Steane
:
TAPESTRY: Visualizing Interwoven Identities for Trust Provenance. 1-4

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














