Author of the publication

Countering Security Information Overload through Alert and Packet Visualization.

, , , , , , , and . IEEE Computer Graphics and Applications, 26 (2): 60-70 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Key terrain in cyberspace: Seeking the high ground., , , and . CyCon, page 287-300. IEEE, (2014)Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries., , , and . VizSEC, page 10. IEEE Computer Society, (2005)Towards a cyber common operating picture., , and . CyCon, page 1-17. IEEE, (2013)Malicious interface design: exploiting the user., and . WWW, page 271-280. ACM, (2010)Malicious Interfaces and Personalization's Uninviting Future., and . IEEE Secur. Priv., 7 (3): 64-67 (2009)Toward Instrumenting Network Warfare Competitions to Generate Labeled Datasets., , , , , , and . CSET, USENIX Association, (2009)Evaluating Adversarial Interfaces: An Automated Approach., , , and . IEEE Technol. Soc. Mag., 35 (1): 56-68 (2016)An honest man has nothing to fear: user perceptions on web-based information disclosure., and . SOUPS, volume 229 of ACM International Conference Proceeding Series, page 112-121. ACM, (2007)Cyber Education: A Multi-Level, Multi-Discipline Approach., , , , and . SIGITE, page 43-47. ACM, (2015)A framework for analysis of quotidian exposure in an instrumented world., , , and . ICCST, page 126-134. IEEE, (2012)