Author: John A. Copeland
Publication Overview
Publication period start: 2006
Number of co-authors: 10
Co-Authors
Number of publications with favourite co-authors
Productive Colleagues
Most productive colleagues in number of publications
Publications
Conti,
Gregory J.,
Abdullah,
Kulsoom,
Grizzard,
Julian B.,
Stasko,
John T.,
Copeland,
John A.,
Ahamad,
Mustaque,
Owen,
Henry L.,
Lee,
Christopher P.
(2006):
Countering Security Information Overload through Alert and Packet Visualization.
In
IEEE Computer Graphics and Applications,
26
(2)
pp. 60-70.
https://doi.ieeecomputersociety.org/10.1109/MCG.2006.30
Abdullah,
Kulsoom,
Lee,
Christopher P.,
Conti,
Gregory J.,
Copeland,
John A.,
Stasko,
John T.
(2005):
IDS RainStorm: Visualizing IDS Alarms.
In:
Ma,
Kwan-Liu,
North,
Stephen C.,
Yurcik,
William
(eds.)
VizSEC 2005 - IEEE Workshop on Visualization for Computer Security
26 October,
2005,
Minneapolis, MN, USA.
pp. 1.
https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.8
Abdullah,
Kulsoom,
Copeland,
John A.
(2006):
Tool update: high alarm count issues in IDS rainstorm.
In:
Yurcik,
William,
Axelsson,
Stefan,
Lakkaraju,
Kiran,
Teoh,
Soon Tee
(eds.)
VizSEC 2006 - 3rd Workshop on Visualization for Computer Security
3 November,
2006,
Alexandria, Virginia, USA.
pp. 61-62.
https://doi.acm.org/10.1145/1179576.1179587
Lee,
Christopher P.,
Copeland,
John A.
(2006):
Flowtag: a collaborative attack-analysis, reporting, and sharing tool for security researc.
In:
Yurcik,
William,
Axelsson,
Stefan,
Lakkaraju,
Kiran,
Teoh,
Soon Tee
(eds.)
VizSEC 2006 - 3rd Workshop on Visualization for Computer Security
3 November,
2006,
Alexandria, Virginia, USA.
pp. 103-108.
https://doi.acm.org/10.1145/1179576.1179597
Lee,
Christopher P.,
Trost,
Jason,
Gibbs,
Nicholas,
Beyah,
Raheem A.,
Copeland,
John A.
(2005):
Visual Firewall: Real-time Network Security Monito.
In:
Ma,
Kwan-Liu,
North,
Stephen C.,
Yurcik,
William
(eds.)
VizSEC 2005 - IEEE Workshop on Visualization for Computer Security
26 October,
2005,
Minneapolis, MN, USA.
pp. 16.
https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.20