| 2005 | 2nd IEEE Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005 Kwan-Liu Ma, Stephen C. North, William Yurcik |
| 2005 | A User-centered Look at Glyph-based Security Visualization. Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, John R. Goodall, Amit Joshi |
| 2005 | A Visualization Methodology for Characterization of Network Scans. Chris Muelder, Kwan-Liu Ma, Tony Bartoletti |
| 2005 | Closing-the-Loop in NVisionIP: Integrating Discovery and Search in Security Visualizations. Kiran Lakkaraju, Ratna Bearavolu, Adam J. Slagell, William Yurcik, Stephen C. North |
| 2005 | Committees. |
| 2005 | Copyright. |
| 2005 | Designing Visualization Capabilities for IDS Challenges. Robert F. Erbacher, Kim Christensen, Amanda Sundberg |
| 2005 | Exploring Three-dimensional Visualization for Intrusion Detection. Adam Oline, Dirk Reiners |
| 2005 | IDGraphs: Intrusion Detection and Analysis Using Histographs. Pin Ren, Yan Gao, Zhichun Li, Yan Chen, Benjamin Watson |
| 2005 | IDS RainStorm: Visualizing IDS Alarms. Kulsoom Abdullah, Christopher P. Lee, Gregory J. Conti, John A. Copeland, John T. Stasko |
| 2005 | Information Assurance Visualizations for Specific Stages of Situational Awareness and Intended Uses: Lessons Learned. Anita D'Amico, Michael Kocka |
| 2005 | Multiple Coordinated Views for Network Attack Graphs. Steven Noel, Michael Jacobs, Pramod Kalapa, Sushil Jajodia |
| 2005 | Preface. |
| 2005 | Preserving the Big Picture: Visual Network Traffic Analysis with TN. John R. Goodall, Wayne G. Lutters, Penny Rheingans, Anita Komlodi |
| 2005 | Root Polar Layout of Internet Address Data for Security Administration. Glenn A. Fink, Chris North |
| 2005 | Title Page. |
| 2005 | Visual Correlation of Host Processes and Network Traffic. Glenn A. Fink, Paul Muessig, Chris North |
| 2005 | Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries. Gregory J. Conti, Julian B. Grizzard, Mustaque Ahamad, Henry L. Owen |
| 2005 | Visual Firewall: Real-time Network Security Monito. Christopher P. Lee, Jason Trost, Nicholas Gibbs, Raheem A. Beyah, John A. Copeland |
| 2005 | Visualization of Automated Trust Negotiation. Danfeng Yao, Michael Shin, Roberto Tamassia, William H. Winsborough |
| 2005 | Visualizing Cyber Attacks using IP Matrix. Hideki Koike, Kazuhiro Ohno, Kanba Koizumi |