| 2009 | 6th International Workshop on Visualization for Cyber Security, VizSec 2009, Atlantic City, NJ, USA, October 11, 2009 Deborah A. Frincke, Carrie Gates, John R. Goodall, Robert F. Erbacher |
| 2009 | A visual analytic framework for exploring relationships in textual contents of digital forensics evidence. T. J. Jankun-Kelly, David Wilson, Andrew S. Stamps, Josh Franck, Jeffrey C. Carver, J. Edward Swan II |
| 2009 | Over flow: An overview visualization for network analysis. Joel Glanfield, Stephen Brooks, Teryl Taylor, Diana Paterson, Christopher Smith, Carrie Gates, John McHugh |
| 2009 | Security visualization tools and IPv6 addresses. David Barrera, Paul C. van Oorschot |
| 2009 | Visual analysis of malware behavior using treemaps and thread graphs. Philipp Trinius, Thorsten Holz, Jan Göbel, Felix C. Freiling |
| 2009 | Visual tools for security: Is there a there there? Bill Cheswick |
| 2009 | Visualization is better! A comparative evaluation. John R. Goodall |
| 2009 | Visualization of complex attacks and state of attacked network. Anatoly Yelizarov, Dennis Gamayunov |
| 2009 | Visualizing compiled executables for malware analysis. Daniel Quist, Lorie M. Liebrock |
| 2009 | Visualizing cyber security: Usable workspaces. Glenn A. Fink, Christopher L. North, Alex Endert, Stuart Rose |
| 2009 | Visualizing firewall configurations using created voids. Shaun P. Morrissey, Georges G. Grinstein |
| 2009 | Visualizing keyboard pattern passwords. Dino Schweitzer, Jeff Boleng, Colin Hughes, Louis Murphy |