The Community for Technology Leaders
RSS Icon
Issue No.02 - March/April (2006 vol.26)
pp: 26-27
Kwan-Liu Ma , University of California, Davis
The guest editor introduces this special issue. The five theme articles highlight the latest development and practice for visualization for cybersecurity.
visualization, cybersecurity
Kwan-Liu Ma, "Guest Editor's Introduction: Visualization for Cybersecurity", IEEE Computer Graphics and Applications, vol.26, no. 2, pp. 26-27, March/April 2006, doi:10.1109/MCG.2006.33
1. C. Muelder, K.-L. Ma, and T. Bartoletti, "Interactive Visualization for Network and Port Scan Detection," Proc. 8th Int'l Symp. Recent Advances in Intrusion Detection (RAID), Springer Verlag, 2005, pp. 265-283.
2. C. Muelder, K.-L. Ma, and T. Bartoletti "A Visualization Methodology for Characterization of Network Scans," Proc. IEEE Workshop Visualization for Computer Security (VizSEC), IEEE CS Press, > 2005, pp. 29-38.
3. C. Brodley et al., eds., , Proc. ACM Workshop Visualization and Data Mining for Computer Security, ACM Press, 2004.
4. K.-L. Ma, S. North, and B. Yurcik, eds., Proc. IEEE Workshop Visualization for Computer Security, IEEE CS Press, 2005.
2 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool