Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/vizsec/vizsec2009.bht:"
@inproceedings{DBLP:conf/vizsec/BarreraO09, author = {David Barrera and Paul C. van Oorschot}, editor = {Deborah A. Frincke and Carrie Gates and John R. Goodall and Robert F. Erbacher}, title = {Security visualization tools and IPv6 addresses}, booktitle = {6th International Workshop on Visualization for Cyber Security, VizSec 2009, Atlantic City, NJ, USA, October 11, 2009}, pages = {21--26}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/VIZSEC.2009.5375538}, doi = {10.1109/VIZSEC.2009.5375538}, timestamp = {Wed, 24 Feb 2021 16:44:20 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/BarreraO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/Cheswick09, author = {Bill Cheswick}, editor = {Deborah A. Frincke and Carrie Gates and John R. Goodall and Robert F. Erbacher}, title = {Visual tools for security: Is there a there there?}, booktitle = {6th International Workshop on Visualization for Cyber Security, VizSec 2009, Atlantic City, NJ, USA, October 11, 2009}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/VIZSEC.2009.5375533}, doi = {10.1109/VIZSEC.2009.5375533}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/Cheswick09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/FinkNER09, author = {Glenn A. Fink and Christopher L. North and Alex Endert and Stuart Rose}, editor = {Deborah A. Frincke and Carrie Gates and John R. Goodall and Robert F. Erbacher}, title = {Visualizing cyber security: Usable workspaces}, booktitle = {6th International Workshop on Visualization for Cyber Security, VizSec 2009, Atlantic City, NJ, USA, October 11, 2009}, pages = {45--56}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/VIZSEC.2009.5375542}, doi = {10.1109/VIZSEC.2009.5375542}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/FinkNER09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/GlanfieldBTPSGM09, author = {Joel Glanfield and Stephen Brooks and Teryl Taylor and Diana Paterson and Christopher Smith and Carrie Gates and John McHugh}, editor = {Deborah A. Frincke and Carrie Gates and John R. Goodall and Robert F. Erbacher}, title = {Over flow: An overview visualization for network analysis}, booktitle = {6th International Workshop on Visualization for Cyber Security, VizSec 2009, Atlantic City, NJ, USA, October 11, 2009}, pages = {11--19}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/VIZSEC.2009.5375536}, doi = {10.1109/VIZSEC.2009.5375536}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/GlanfieldBTPSGM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/Goodall09, author = {John R. Goodall}, editor = {Deborah A. Frincke and Carrie Gates and John R. Goodall and Robert F. Erbacher}, title = {Visualization is better! {A} comparative evaluation}, booktitle = {6th International Workshop on Visualization for Cyber Security, VizSec 2009, Atlantic City, NJ, USA, October 11, 2009}, pages = {57--68}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/VIZSEC.2009.5375543}, doi = {10.1109/VIZSEC.2009.5375543}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/Goodall09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/Jankun-KellyWSFCS09, author = {T. J. Jankun{-}Kelly and David Wilson and Andrew S. Stamps and Josh Franck and Jeffrey C. Carver and J. Edward Swan II}, editor = {Deborah A. Frincke and Carrie Gates and John R. Goodall and Robert F. Erbacher}, title = {A visual analytic framework for exploring relationships in textual contents of digital forensics evidence}, booktitle = {6th International Workshop on Visualization for Cyber Security, VizSec 2009, Atlantic City, NJ, USA, October 11, 2009}, pages = {39--44}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/VIZSEC.2009.5375541}, doi = {10.1109/VIZSEC.2009.5375541}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/Jankun-KellyWSFCS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/MorrisseyG09, author = {Shaun P. Morrissey and Georges G. Grinstein}, editor = {Deborah A. Frincke and Carrie Gates and John R. Goodall and Robert F. Erbacher}, title = {Visualizing firewall configurations using created voids}, booktitle = {6th International Workshop on Visualization for Cyber Security, VizSec 2009, Atlantic City, NJ, USA, October 11, 2009}, pages = {75--79}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/VIZSEC.2009.5375546}, doi = {10.1109/VIZSEC.2009.5375546}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/MorrisseyG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/QuistL09, author = {Daniel Quist and Lorie M. Liebrock}, editor = {Deborah A. Frincke and Carrie Gates and John R. Goodall and Robert F. Erbacher}, title = {Visualizing compiled executables for malware analysis}, booktitle = {6th International Workshop on Visualization for Cyber Security, VizSec 2009, Atlantic City, NJ, USA, October 11, 2009}, pages = {27--32}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/VIZSEC.2009.5375539}, doi = {10.1109/VIZSEC.2009.5375539}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/QuistL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/SchweitzerBHM09, author = {Dino Schweitzer and Jeff Boleng and Colin Hughes and Louis Murphy}, editor = {Deborah A. Frincke and Carrie Gates and John R. Goodall and Robert F. Erbacher}, title = {Visualizing keyboard pattern passwords}, booktitle = {6th International Workshop on Visualization for Cyber Security, VizSec 2009, Atlantic City, NJ, USA, October 11, 2009}, pages = {69--73}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/VIZSEC.2009.5375544}, doi = {10.1109/VIZSEC.2009.5375544}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vizsec/SchweitzerBHM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/TriniusHGF09, author = {Philipp Trinius and Thorsten Holz and Jan G{\"{o}}bel and Felix C. Freiling}, editor = {Deborah A. Frincke and Carrie Gates and John R. Goodall and Robert F. Erbacher}, title = {Visual analysis of malware behavior using treemaps and thread graphs}, booktitle = {6th International Workshop on Visualization for Cyber Security, VizSec 2009, Atlantic City, NJ, USA, October 11, 2009}, pages = {33--38}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/VIZSEC.2009.5375540}, doi = {10.1109/VIZSEC.2009.5375540}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/TriniusHGF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/YelizarovG09, author = {Anatoly Yelizarov and Dennis Gamayunov}, editor = {Deborah A. Frincke and Carrie Gates and John R. Goodall and Robert F. Erbacher}, title = {Visualization of complex attacks and state of attacked network}, booktitle = {6th International Workshop on Visualization for Cyber Security, VizSec 2009, Atlantic City, NJ, USA, October 11, 2009}, pages = {1--9}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/VIZSEC.2009.5375527}, doi = {10.1109/VIZSEC.2009.5375527}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/YelizarovG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/vizsec/2009, editor = {Deborah A. Frincke and Carrie Gates and John R. Goodall and Robert F. Erbacher}, title = {6th International Workshop on Visualization for Cyber Security, VizSec 2009, Atlantic City, NJ, USA, October 11, 2009}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://ieeexplore.ieee.org/xpl/conhome/5368324/proceeding}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.