Kulsoom Abdullah
Cited by
Cited by
IDS RainStorm: Visualizing IDS Alarms.
K Abdullah, CP Lee, GJ Conti, JA Copeland, JT Stasko
VizSEC, 1, 2005
Passive visual fingerprinting of network attack tools
G Conti, K Abdullah
Proceedings of the 2004 ACM workshop on Visualization and data mining for …, 2004
Visualizing network data for intrusion detection
K Abdullah, C Lee, G Conti, JA Copeland
Information Assurance Workshop, 2005. IAW'05. Proceedings from the Sixth …, 2005
P3D: A parallel 3D coordinate visualization for advanced network scans
T Nunnally, P Chi, K Abdullah, AS Uluagac, JA Copeland, R Beyah
Communications (ICC), 2013 IEEE International Conference on, 2052-2057, 2013
Countering security information overload through alert and packet visualization
G Conti, K Abdullah, J Grizzard, J Stasko, JA Copeland, M Ahamad, ...
Computer Graphics and Applications, IEEE 26 (2), 60-70, 2006
NAVSEC: a recommender system for 3D network security visualizations
T Nunnally, K Abdullah, AS Uluagac, JA Copeland, R Beyah
Proceedings of the Tenth Workshop on Visualization for Cyber Security, 41-48, 2013
Tool update: high alarm count issues in IDS rainstorm
K Abdullah, JA Copeland
Proceedings of the 3rd international workshop on Visualization for computer …, 2006
Self-monitoring of web-based information disclosure
K Abdullah, G Conti, E Sobiesk
Proceedings of the 2007 ACM workshop on Privacy in electronic society, 56-59, 2007
A Visualization Framework for Self-monitoring of Web-based Information Disclosure
K Abdullah, G Conti, R Beyah
Communications, 2008. ICC'08. IEEE International Conference on, 1700-1707, 2008
Scaling and Visualizing Network Data to Facilitate in Intrusion Detection Tasks
K Abdullah
Georgia Institute of Technology, 2006
Processing Data to Construct Practical Visualizations for Network Security
K Abdullah, C Lee, G Conti, J Copeland
Information Assurance Newsletter 9, 3-7, 2006
Routing security in Ad hoc networks
K Abdullah
Georgia: Georgia Institute of Technology.(2002-11-27)[2005-10-30]. http …, 0
The system can't perform the operation now. Try again later.
Articles 1–12