| 2004 | 1st ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004 Carla E. Brodley, Philip Chan, Richard Lippmann, William Yurcik |
| 2004 | Combining a bayesian classifier with visualisation: understanding the IDS. Stefan Axelsson |
| 2004 | Combining visual and automated data mining for near-real-time anomaly detection and analysis in BGP. Soon Tee Teoh, Ke Zhang, Shih-Ming Tseng, Kwan-Liu Ma, Shyhtsun Felix Wu |
| 2004 | CyberSeer: 3D audio-visual immersion for network security and management. Christos Papadopoulos, Chris Kyriakakis, Alexander A. Sawchuk, Xinming He |
| 2004 | Email archive analysis through graphical visualization. Wei-Jen Li, Shlomo Hershkop, Salvatore J. Stolfo |
| 2004 | HMM profiles for network traffic classification. Charles V. Wright, Fabian Monrose, Gerald M. Masson |
| 2004 | Home-centric visualization of network traffic for security administration. Robert Ball, Glenn A. Fink, Chris North |
| 2004 | MORPHEUS: motif oriented representations to purge hostile events from unlabeled sequences. Gaurav Tandon, Philip K. Chan, Debasis Mitra |
| 2004 | Managing attack graph complexity through visual hierarchical aggregation. Steven Noel, Sushil Jajodia |
| 2004 | NVisionCC: a visualization framework for high performance cluster security. William Yurcik, Xin Meng, Nadir Kiyanclar |
| 2004 | NVisionIP: netflow visualizations of system state for security situational awareness. Kiran Lakkaraju, William Yurcik, Adam J. Lee |
| 2004 | Passive visual fingerprinting of network attack tools. Gregory J. Conti, Kulsoom Abdullah |
| 2004 | PortVis: a tool for port-based detection of security events. Jonathan McPherson, Kwan-Liu Ma, Paul Krystosk, Tony Bartoletti, Marvin Christensen |
| 2004 | Scalable visualization of propagating internet phenomena. Alfonso Valdes, Martin W. Fong |
| 2004 | Scatter (and other) plots for visualizing user profiling data and network traffic. Thomas Goldring |
| 2004 | SnortView: visualization system of snort logs. Hideki Koike, Kazuhiro Ohno |
| 2004 | Statistical profiling and visualization for detection of malicious insider attacks on computer networks. Jeffrey B. Colombe, Greg Stephens |
| 2004 | User re-authentication via mouse movements. Maja Pusara, Carla E. Brodley |
| 2004 | VisFlowConnect: netflow visualizations of link relationships for security situational awareness. Xiaoxin Yin, William Yurcik, Michael Treaster, Yifan Li, Kiran Lakkaraju |
| 2004 | Visualizing windows executable viruses using self-organizing maps. InSeon Yoo |