The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - March/April (2006 vol.26)
pp: 26-27
Kwan-Liu Ma , University of California, Davis
ABSTRACT
The guest editor introduces this special issue. The five theme articles highlight the latest development and practice for visualization for cybersecurity.
INDEX TERMS
visualization, cybersecurity
CITATION
Kwan-Liu Ma, "Guest Editor's Introduction: Visualization for Cybersecurity", IEEE Computer Graphics and Applications, vol.26, no. 2, pp. 26-27, March/April 2006, doi:10.1109/MCG.2006.33
REFERENCES
1. C. Muelder, K.-L. Ma, and T. Bartoletti, "Interactive Visualization for Network and Port Scan Detection," Proc. 8th Int'l Symp. Recent Advances in Intrusion Detection (RAID), Springer Verlag, 2005, pp. 265-283.
2. C. Muelder, K.-L. Ma, and T. Bartoletti "A Visualization Methodology for Characterization of Network Scans," Proc. IEEE Workshop Visualization for Computer Security (VizSEC), IEEE CS Press, > 2005, pp. 29-38.
3. C. Brodley et al., eds., , Proc. ACM Workshop Visualization and Data Mining for Computer Security, ACM Press, 2004.
4. K.-L. Ma, S. North, and B. Yurcik, eds., Proc. IEEE Workshop Visualization for Computer Security, IEEE CS Press, 2005.
29 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool