Glenn A. Fink
Title
Cited by
Cited by
Year
Home-centric visualization of network traffic for security administration
R Ball, GA Fink, C North
Proceedings of the 2004 ACM workshop on Visualization and data mining for …, 2004
2382004
Security and privacy in cyber-physical systems: Foundations, principles, and applications
H Song, GA Fink, S Jeschke
John Wiley & Sons, 2021
1302021
Predicting Computer System Failures Using Support Vector Machines.
EW Fulp, GA Fink, JN Haack
WASL 8, 5-5, 2008
1082008
Visualizing cyber security: Usable workspaces
GA Fink, CL North, A Endert, S Rose
2009 6th international workshop on visualization for cyber security, 45-56, 2009
1002009
Analytic provenance: process+ interaction+ insight
C North, R Chang, A Endert, W Dou, R May, B Pike, G Fink
CHI'11 Extended Abstracts on Human Factors in Computing Systems, 33-36, 2011
962011
Visual correlation of host processes and network traffic
GA Fink, P Muessig, C North
IEEE Workshop on Visualization for Computer Security, 2005.(VizSEC 05)., 11-19, 2005
692005
A multi-phase network situational awareness cognitive task analysis
RF Erbacher, DA Frincke, PC Wong, S Moody, G Fink
Information Visualization 9 (3), 204-219, 2010
682010
A metrics-based approach to intrusion detection system evaluation for distributed real-time systems
GA Fink, BL Chappell, TG Turner, KF O'Donoghue
Proceedings 16th International Parallel and Distributed Processing Symposium …, 2002
522002
Security and privacy grand challenges for the Internet of Things
GA Fink, DV Zarzhitsky, TE Carroll, ED Farquhar
2015 International Conference on Collaboration Technologies and Systems (CTS …, 2015
492015
Defense on the move: ant-based cyber defense
GA Fink, JN Haack, AD McKinnon, EW Fulp
IEEE Security & Privacy 12 (2), 36-43, 2014
392014
Ant-based cyber security
JN Haack, GA Fink, WM Maiden, AD McKinnon, SJ Templeton, EW Fulp
2011 Eighth International Conference on Information Technology: New …, 2011
392011
Gamification for measuring cyber security situational awareness
G Fink, D Best, D Manz, V Popovsky, B Endicott-Popovsky
International Conference on Augmented Cognition, 656-665, 2013
282013
Mixed-Initiative Cyber Security: Putting humans in the right loop
JN Haack, GA Fink, WM Maiden, D McKinnon, EW Fulp
Mixed-Initiative Multiagent Systems (MIMS), 35, 2009
262009
Security and privacy in cyber-physical systems
GA Fink, TW Edgar, TR Rice, DG MacDonald, CE Crawford
Cyber-physical systems, 129-141, 2017
252017
Situational awareness as a measure of performance in cyber security collaborative work
A Malviya, GA Fink, L Sego, B Endicott-Popovsky
2011 Eighth International Conference on Information Technology: New …, 2011
252011
Bridging the Host-Network Divide: Survey, Taxonomy, and Solution.
GA Fink, V Duggirala, R Correa, C North
LISA, 247-262, 2006
252006
Root Polar Layout of Internet Address Data for Security Administration.
GA Fink, C North
VizSEC, 7, 2005
242005
Cognitive task analysis of network analysts and managers for network situational awareness
RF Erbacher, DA Frincke, PC Wong, S Moody, G Fink
Visualization and Data Analysis 2010 7530, 75300H, 2010
192010
Dualtrust: A distributed trust model for swarm-based autonomic computing systems
W Maiden, I Dionysiou, D Frincke, G Fink, DE Bakken
Data Privacy Management and Autonomous Spontaneous Security, 188-202, 2010
162010
Network eye: End-to-end computer security visualization
G Fink, R Ball, N Jawalkar, C North, R Correa
Submitted for consideration at ACM CCS Workshop on Visualization and Data …, 2004
152004
The system can't perform the operation now. Try again later.
Articles 1–20