Reflecting on visualization for cyber security
暂无分享,去创建一个
[1] John R. Goodall,et al. Visualization is better! A comparative evaluation , 2009, 2009 6th International Workshop on Visualization for Cyber Security.
[2] Ehab Al-Shaer,et al. PolicyVis: Firewall Security Policy Visualization and Inspection , 2007, LISA.
[3] Jeffrey C. Carver,et al. Show Me How You See: Lessons from Studying Computer Forensics Experts for Visualization , 2008, VizSEC.
[4] M. Sheelagh T. Carpendale,et al. Empirical Studies in Information Visualization: Seven Scenarios , 2012, IEEE Transactions on Visualization and Computer Graphics.
[5] Bill Cheswick,et al. Visual analysis of complex firewall configurations , 2012, VizSec '12.
[6] Catherine Plaisant,et al. The challenge of information visualization evaluation , 2004, AVI.
[7] Andreas Butz,et al. Evaluating information visualization in large companies: challenges, experiences and recommendations , 2010, BELIV '10.
[8] John McHugh,et al. FloVis: Leveraging Visualization to Protect Sensitive Network Infrastructure , 2009 .
[9] John R. Goodall,et al. Visual analysis of code security , 2010, VizSec '10.
[10] Serge Mankovskii,et al. Managing information overload on large enterprise systems , 2011, 2011 8th International Conference & Expo on Emerging Technologies for a Smarter World.
[11] John McHugh,et al. Over flow: An overview visualization for network analysis , 2009, 2009 6th International Workshop on Visualization for Cyber Security.
[12] John McHugh,et al. FloVis: Flow Visualization System , 2009, 2009 Cybersecurity Applications & Technology Conference for Homeland Security.