Author: William Yurcik
Publication Overview
Publication period start: 2001
Number of co-authors: 25
Co-Authors
Number of publications with favourite co-authors
Productive Colleagues
Most productive colleagues in number of publications
Publications
Yurcik,
William,
Thompson,
Ramona Su,
Twidale,
Michael B.,
Rantanen,
Esa M.
(2007):
If you can\'t beat \'em, join \'em: combining text and visual interfaces for security-syst.
In
Interactions,
14
(1)
pp. 12-14.
https://dl.acm.org/doi/10.1145/1189976.1189988
Yurcik,
William
(2002):
Special issue on specialized computer architecture simulators that see the present and may.
In
ACM Journal of Educational Resources in Computing,
2
(1)
pp. 1-3.
Yehezkel,
Cecile,
Yurcik,
William,
Pearson,
Murray,
Armstrong,
Dean
(2001):
Three simulator tools for teaching computer architecture: Little Man computer, and RTLSim.
In
ACM Journal of Educational Resources in Computing,
1
(4)
pp. 60-80.
Yurcik,
William
(2001):
Editorial.
In
ACM Journal of Educational Resources in Computing,
1
(4)
pp. 1-3.
Thompson,
Ramona Su,
Rantanen,
Esa M.,
Yurcik,
William,
Bailey,
Brian P.
(2007):
Command line or pretty lines?: comparing textual and visual interfaces for intrusion detec.
In:
Proceedings of ACM CHI 2007 Conference on Human Factors in Computing Systems
,
2007,
.
pp. 1205-1214.
https://doi.acm.org/10.1145/1240624.1240807
Ma,
Kwan-Liu,
North,
Stephen C.,
Yurcik,
William
(eds.)
VizSEC 2005 - IEEE Workshop on Visualization for Computer Security
26 October,
2005,
Minneapolis, MN, USA.
Lakkaraju,
Kiran,
Bearavolu,
Ratna,
Slagell,
Adam J.,
Yurcik,
William,
North,
Stephen C.
(2005):
Closing-the-Loop in NVisionIP: Integrating Discovery and Search in Security Visualizations.
In:
Ma,
Kwan-Liu,
North,
Stephen C.,
Yurcik,
William
(eds.)
VizSEC 2005 - IEEE Workshop on Visualization for Computer Security
26 October,
2005,
Minneapolis, MN, USA.
pp. 9.
https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.3
Yurcik,
William,
Axelsson,
Stefan,
Lakkaraju,
Kiran,
Teoh,
Soon Tee
(eds.)
VizSEC 2006 - 3rd Workshop on Visualization for Computer Security
3 November,
2006,
Alexandria, Virginia, USA.
Brodley,
Carla E.,
Chan,
Philip,
Lippman,
Richard,
Yurcik,
William
(eds.)
VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security
29 October,
2004,
Washington DC, USA.
Yurcik,
William
(2006):
Tool update: visflowconnect-IP with advanced filtering from usability testing.
In:
Yurcik,
William,
Axelsson,
Stefan,
Lakkaraju,
Kiran,
Teoh,
Soon Tee
(eds.)
VizSEC 2006 - 3rd Workshop on Visualization for Computer Security
3 November,
2006,
Alexandria, Virginia, USA.
pp. 63-64.
https://doi.acm.org/10.1145/1179576.1179588
Yurcik,
William
(2006):
Tool update: NVisionIP improvements (difference view, sparklines, and shapes).
In:
Yurcik,
William,
Axelsson,
Stefan,
Lakkaraju,
Kiran,
Teoh,
Soon Tee
(eds.)
VizSEC 2006 - 3rd Workshop on Visualization for Computer Security
3 November,
2006,
Alexandria, Virginia, USA.
pp. 65-66.
https://doi.acm.org/10.1145/1179576.1179589
Yin,
Xiaoxin,
Yurcik,
William,
Treaster,
Michael,
Li,
Yifan,
Lakkaraju,
Kiran
(2004):
VisFlowConnect: netflow visualizations of link relationships for security situational awar.
In:
Brodley,
Carla E.,
Chan,
Philip,
Lippman,
Richard,
Yurcik,
William
(eds.)
VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security
29 October,
2004,
Washington DC, USA.
pp. 26-34.
https://doi.acm.org/10.1145/1029208.1029214
Yurcik,
William,
Meng,
Xin,
Kiyanclar,
Nadir
(2004):
NVisionCC: a visualization framework for high performance cluster security.
In:
Brodley,
Carla E.,
Chan,
Philip,
Lippman,
Richard,
Yurcik,
William
(eds.)
VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security
29 October,
2004,
Washington DC, USA.
pp. 133-137.
https://doi.acm.org/10.1145/1029208.1029230
Lakkaraju,
Kiran,
Yurcik,
William,
Lee,
Adam J.
(2004):
NVisionIP: netflow visualizations of system state for security situational awareness.
In:
Brodley,
Carla E.,
Chan,
Philip,
Lippman,
Richard,
Yurcik,
William
(eds.)
VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security
29 October,
2004,
Washington DC, USA.
pp. 65-72.
https://doi.acm.org/10.1145/1029208.1029219