Login / Signup

Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries.

Gregory J. ContiJulian B. GrizzardMustaque AhamadHenry L. Owen
Published in: VizSEC (2005)
Keyphrases