| 2006 | 3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006 William Yurcik, Stefan Axelsson, Kiran Lakkaraju, Soon Tee Teoh |
| 2006 | An intelligent, interactive tool for exploration and visualization of time-oriented security data. Asaf Shabtai, Denis Klimov, Yuval Shahar, Yuval Elovici |
| 2006 | BGP eye: a new visualization tool for real-time detection and analysis of BGP anomalies. Soon Tee Teoh, Supranamaya Ranjan, Antonio Nucci, Chen-Nee Chuah |
| 2006 | Discovering an RC4 anomaly through visualization. Dino Schweitzer, Leemon C. Baird III |
| 2006 | Ensuring the continuing success of vizsec. Pin Ren |
| 2006 | Flowtag: a collaborative attack-analysis, reporting, and sharing tool for security researchers. Christopher P. Lee, John A. Copeland |
| 2006 | Interactively combining 2D and 3D visualization for network traffic monitoring. Erwan Le Malécot, Masayoshi Kohara, Yoshiaki Hori, Kouichi Sakurai |
| 2006 | Real-time collaborative network monitoring and control using 3D game engines for representation and interaction. Warren Harrop, Grenville J. Armitage |
| 2006 | Tool update: William Yurcik |
| 2006 | Tool update: William Yurcik |
| 2006 | Tool update: high alarm count issues in IDS rainstorm. Kulsoom Abdullah, John A. Copeland |
| 2006 | USEable security: interface design strategies for improving security. Amanda L. Stephano, Dennis P. Groth |
| 2006 | Understanding multistage attacks by attack-track based visualization of heterogeneous event streams. Sunu Mathew, Richard Giomundo, Shambhu J. Upadhyaya, Moises Sudit, Adam Stotz |
| 2006 | Using visual motifs to classify encrypted traffic. Charles V. Wright, Fabian Monrose, Gerald M. Masson |
| 2006 | VAST: visualizing autonomous system topology. Jon Oberheide, Manish Karir, Dionysus Blazakis |
| 2006 | Visual toolkit for network security experiment specification and data analysis. Lunquan Li, Peng Liu, George Kesidis |
| 2006 | Visualization assisted detection of sybil attacks in wireless networks. Weichao Wang, Aidong Lu |
| 2006 | Visualization for privacy compliance. George Yee |
| 2006 | Visualizations to improve reactivity towards security incidents inside corporate networks. Patrick Hertzog |
| 2006 | Visualizing DNS traffic. Pin Ren, John Kristoff, Bruce Gooch |