| 2010 | 7th International Symposium on Visualization for Cyber Security, VizSec 2010, Ottawa, ON, Canada, September 14, 2010 John Gerth |
| 2010 | EMBER: a global perspective on extreme malicious behavior. Tamara Yu, Richard Lippmann, James Riordan, Stephen W. Boyer |
| 2010 | Interactive detection of network anomalies via coordinated multiple views. Lane Harrison, Xianlin Hu, Xiaowei Ying, Aidong Lu, Weichao Wang, Xintao Wu |
| 2010 | Nimble cybersecurity incident management through visualization and defensible recommendations. Jamie C. Rasmussen, Kate Ehrlich, Steven I. Ross, Susanna E. Kirk, Daniel M. Gruen, John F. Patterson |
| 2010 | PeekKernelFlows: peeking into IP flows. Cynthia Wagner, Gérard Wagener, Radu State, Alexandre Dulaunoy, Thomas Engel |
| 2010 | Proposing a multi-touch interface for intrusion detection environments. Jeffrey Guenther, Fred Volk, Mark Shaneck |
| 2010 | Real-time visualization of network behaviors for situational awareness. Daniel M. Best, Shawn Bohn, Douglas Love, Adam Wynne, William A. Pike |
| 2010 | Traffic classification using visual motifs: an empirical evaluation. Wilson Lian, Fabian Monrose, John McHugh |
| 2010 | Visual analysis of code security. John R. Goodall, Hassan Radwan, Lenny Halseth |
| 2010 | Visualizing attack graphs, reachability, and trust relationships with NAVIGATOR. Matthew Chu, Kyle Ingols, Richard Lippmann, Seth E. Webster, Stephen W. Boyer |
| 2010 | Visualizing graph dynamics and similarity for enterprise network security and management. Qi Liao, Aaron Striegel, Nitesh V. Chawla |
| 2010 | Visualizing host traffic through graphs. Eduard Glatz |
| 2010 | Visualizing your key for secure phone calls and language independence. Michael Oehler, Dhananjay S. Phatak, F. John Krautheim |