COUNTERING NETWORK LEVEL DENIAL OF INFORMATION

[1]  Calton Pu,et al.  Guarding the next Internet frontier: countering denial of information attacks , 2002, NSPW '02.

[2]  Elias Levy Interface Illusions , 2004, IEEE Secur. Priv..

[3]  Edward R. Tufte Visual explanations: images and quantities, evidence and narrative , 1997 .

[4]  T. J. Jankun-Kelly,et al.  Visual Data Analysis for Detecting Flaws and Intruders in Computer Network Systems , 2004 .

[5]  Daniel A. Keim,et al.  Visualizing large-scale telecommunication networks and services (case study) , 1999, VIS '99.

[6]  Patrick Pantel,et al.  SpamCop: A Spam Classification & Organisation Program , 1998, AAAI 1998.

[7]  A. Globus,et al.  Fourteen Ways to Say Nothing with Scientific Visualization , 1994, Computer.

[8]  Stephen Lau,et al.  The Spinning Cube of Potential Doom , 2004, CACM.

[9]  Michael I. Jordan,et al.  Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint , 2001 .

[10]  Gerald E. Jones How to Lie with Charts , 1995 .

[11]  Kwan-Liu Ma,et al.  PortVis: a tool for port-based detection of security events , 2004, VizSEC/DMSEC '04.

[12]  Norman C. Gysbers,et al.  So Far, So Good , 2002 .

[13]  Andrew Davison,et al.  Twelve Ways to Fool the Masses When Giving Performance Results on Parallel Computers , 1995 .

[14]  Allen Newell,et al.  The psychology of human-computer interaction , 1983 .

[15]  Hideki Koike,et al.  SnortView: visualization system of snort logs , 2004, VizSEC/DMSEC '04.

[16]  D. Huff,et al.  How to Lie with Statistics , 1956 .

[17]  Thomas Goldring Scatter (and other) plots for visualizing user profiling data and network traffic , 2004, VizSEC/DMSEC '04.

[18]  Rajeev Motwani,et al.  The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.

[19]  InSeon Yoo,et al.  Visualizing windows executable viruses using self-organizing maps , 2004, VizSEC/DMSEC '04.

[20]  Rob Miller,et al.  Johnny 2: a user test of key continuity management with S/MIME and Outlook Express , 2005, SOUPS '05.

[21]  Anita D'Amico,et al.  Information assurance visualizations for specific stages of situational awareness and intended uses: lessons learned , 2005, IEEE Workshop on Visualization for Computer Security, 2005. (VizSEC 05)..

[22]  James D. Hollan,et al.  Pad++: A Zoomable Graphical Sketchpad For Exploring Alternate Interface Physics , 1996, J. Vis. Lang. Comput..

[23]  Kofi Nyarko,et al.  Network intrusion visualization with NIVA, an intrusion detection visual analyzer with haptic integration , 2002, Proceedings 10th Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems. HAPTICS 2002.

[24]  Vinod Yegneswaran,et al.  Characteristics of internet background radiation , 2004, IMC '04.

[25]  William A. Arbaugh,et al.  A secure and reliable bootstrap architecture , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[26]  Wayne G. Lutters,et al.  An Information Visualization Framework for Intrusion Detection , 2004, CHI EA '04.

[27]  Kwan-Liu Ma,et al.  Case study: Interactive visualization for Internet security , 2002, IEEE Visualization, 2002. VIS 2002..

[28]  Frank Swiderski,et al.  Threat Modeling , 2018, Hacking Connected Cars.

[29]  Pat Hanrahan,et al.  Interactive visualization of large graphs and networks , 2000 .

[30]  Yifan Li,et al.  VisFlowConnect: netflow visualizations of link relationships for security situational awareness , 2004, VizSEC/DMSEC '04.

[31]  John R. Goodall,et al.  A user-centered look at glyph-based security visualization , 2005, IEEE Workshop on Visualization for Computer Security, 2005. (VizSEC 05)..

[32]  Edwin Blake An extended platter metaphor for effective reconfigurable network visualization , 2004 .

[33]  David LeBlanc,et al.  Writing Secure Code , 2001 .

[34]  Leland Wilkinson The Grammar of Graphics , 1999 .

[35]  Gregory J. Conti,et al.  Why computer scientists should attend hacker conferences , 2005, CACM.

[36]  Diana K. Smetters,et al.  Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute , 2004, USENIX Security Symposium.

[37]  Jakob Nielsen,et al.  A mathematical model of the finding of usability problems , 1993, INTERCHI.

[38]  Salvatore J. Stolfo,et al.  Anomalous Payload-Based Network Intrusion Detection , 2004, RAID.

[39]  Wayne G. Lutters,et al.  The Work of Intrusion Detection: Rethinking the Role of Security Analysts , 2004, AMCIS.

[40]  Markus Jakobsson,et al.  Social phishing , 2007, CACM.

[41]  Edward R. Tufte,et al.  The cognitive style of PowerPoint , 2003 .

[42]  Bernice E. Rogowitz,et al.  How not to lie with visualization , 1996 .

[43]  Susan T. Dumais,et al.  A Bayesian Approach to Filtering Junk E-Mail , 1998, AAAI 1998.

[44]  William Yurcik,et al.  Two Visual Computer Network Security Monitoring Tools Incorporating Operator Interface Requirements , 2003 .

[45]  B. Shneiderman,et al.  The dynamic HomeFinder: evaluating dynamic queries in a real-estate information exploration system , 1992, SIGIR '92.

[46]  G. A. Miller THE PSYCHOLOGICAL REVIEW THE MAGICAL NUMBER SEVEN, PLUS OR MINUS TWO: SOME LIMITS ON OUR CAPACITY FOR PROCESSING INFORMATION 1 , 1956 .

[47]  Edward R. Tufte,et al.  The Visual Display of Quantitative Information , 1986 .

[48]  Stefan Axelsson,et al.  Combining a bayesian classifier with visualisation: understanding the IDS , 2004, VizSEC/DMSEC '04.

[49]  Alfred Inselberg,et al.  Multidimensional detective , 1997, Proceedings of VIZ '97: Visualization Conference, Information Visualization Symposium and Parallel Rendering Symposium.

[50]  Luc Girardin An Eye on Network Intruder-Administrator Shootouts , 1999, Workshop on Intrusion Detection and Network Monitoring.

[51]  Richard Y. Wang,et al.  Anchoring data quality dimensions in ontological foundations , 1996, CACM.

[52]  Thomas Henry Ptacek,et al.  Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection , 1998 .

[53]  Chris North,et al.  Visual correlation of host processes and network traffic , 2005, IEEE Workshop on Visualization for Computer Security, 2005. (VizSEC 05)..

[54]  Deborah A. Frincke,et al.  Intrusion and Misuse Detection in Large-Scale Systems , 2002, IEEE Computer Graphics and Applications.

[55]  J. Doug Tygar,et al.  Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.

[56]  Edward R. Tufte,et al.  Envisioning Information , 1990 .

[57]  Kwan-Liu Ma,et al.  A visual exploration process for the analysis of Internet routing data , 2003, IEEE Visualization, 2003. VIS 2003..

[58]  Deborah A. Frincke,et al.  Visual behavior characterization for intrusion and misuse detection , 2001, IS&T/SPIE Electronic Imaging.

[59]  P. Fayers,et al.  The Visual Display of Quantitative Information , 1990 .

[60]  Samuel Patton,et al.  An Achilles Heel in Signature-Based IDS : Squealing False Positives in SNORT , 2001 .