VizSEC 2006 - 3rd Workshop on Visualization for Computer Security
- Publisher
- ACM Press
- Website
- Year
- 2006
- Period
- 3 November
- Place
- Alexandria, Virginia, USA
- ISBN
- 1-59593-549-5
- Series
- VizSec - IEEE Workshop on Visualization for Computer Security
- DOI
- Volume
- Copyright info
Description
All years
Articles
Mathew, Sunu, Giomundo, Richard, Upadhyaya, Shambhu J., Sudit, Moises, Stotz, Adam (2006): Understanding multistage attacks by attack-track based visualization of heterogeneous even. In: Yurcik, William, Axelsson, Stefan, Lakkaraju, Kiran, Teoh, Soon Tee (eds.) VizSEC 2006 - 3rd Workshop on Visualization for Computer Security 3 November, 2006, Alexandria, Virginia, USA. pp. 1-6. https://doi.acm.org/10.1145/1179576.1179578
Lee, Christopher P., Copeland, John A. (2006): Flowtag: a collaborative attack-analysis, reporting, and sharing tool for security researc. In: Yurcik, William, Axelsson, Stefan, Lakkaraju, Kiran, Teoh, Soon Tee (eds.) VizSEC 2006 - 3rd Workshop on Visualization for Computer Security 3 November, 2006, Alexandria, Virginia, USA. pp. 103-108. https://doi.acm.org/10.1145/1179576.1179597
Stephano, Amanda L., Groth, Dennis P. (2006): USEable security: interface design strategies for improving security. In: Yurcik, William, Axelsson, Stefan, Lakkaraju, Kiran, Teoh, Soon Tee (eds.) VizSEC 2006 - 3rd Workshop on Visualization for Computer Security 3 November, 2006, Alexandria, Virginia, USA. pp. 109-116. https://doi.acm.org/10.1145/1179576.1179598
Yee, George (2006): Visualization for privacy compliance. In: Yurcik, William, Axelsson, Stefan, Lakkaraju, Kiran, Teoh, Soon Tee (eds.) VizSEC 2006 - 3rd Workshop on Visualization for Computer Security 3 November, 2006, Alexandria, Virginia, USA. pp. 117-122. https://doi.acm.org/10.1145/1179576.1179599
Malécot, Erwan Le, Kohara, Masayoshi, Hori, Yoshiaki, Sakurai, Kouichi (2006): Interactively combining 2D and 3D visualization for network traffic monitoring. In: Yurcik, William, Axelsson, Stefan, Lakkaraju, Kiran, Teoh, Soon Tee (eds.) VizSEC 2006 - 3rd Workshop on Visualization for Computer Security 3 November, 2006, Alexandria, Virginia, USA. pp. 123-127. https://doi.acm.org/10.1145/1179576.1179600
Shabtai, Asaf, Klimov, Denis, Shahar, Yuval, Elovici, Yuval (2006): An intelligent, interactive tool for exploration and visualization of time-oriented securi. In: Yurcik, William, Axelsson, Stefan, Lakkaraju, Kiran, Teoh, Soon Tee (eds.) VizSEC 2006 - 3rd Workshop on Visualization for Computer Security 3 November, 2006, Alexandria, Virginia, USA. pp. 15-22. https://doi.acm.org/10.1145/1179576.1179580
Ren, Pin, Kristoff, John, Gooch, Bruce (2006): Visualizing DNS traffic. In: Yurcik, William, Axelsson, Stefan, Lakkaraju, Kiran, Teoh, Soon Tee (eds.) VizSEC 2006 - 3rd Workshop on Visualization for Computer Security 3 November, 2006, Alexandria, Virginia, USA. pp. 23-30. https://doi.acm.org/10.1145/1179576.1179582
Harrop, Warren, Armitage, Grenville J. (2006): Real-time collaborative network monitoring and control using 3D game engines for represent. In: Yurcik, William, Axelsson, Stefan, Lakkaraju, Kiran, Teoh, Soon Tee (eds.) VizSEC 2006 - 3rd Workshop on Visualization for Computer Security 3 November, 2006, Alexandria, Virginia, USA. pp. 31-40. https://doi.acm.org/10.1145/1179576.1179583
Wright, Charles V., Monrose, Fabian, Masson, Gerald M. (2006): Using visual motifs to classify encrypted traffic. In: Yurcik, William, Axelsson, Stefan, Lakkaraju, Kiran, Teoh, Soon Tee (eds.) VizSEC 2006 - 3rd Workshop on Visualization for Computer Security 3 November, 2006, Alexandria, Virginia, USA. pp. 41-50. https://doi.acm.org/10.1145/1179576.1179584
Wang, Weichao, Lu, Aidong (2006): Visualization assisted detection of sybil attacks in wireless networks. In: Yurcik, William, Axelsson, Stefan, Lakkaraju, Kiran, Teoh, Soon Tee (eds.) VizSEC 2006 - 3rd Workshop on Visualization for Computer Security 3 November, 2006, Alexandria, Virginia, USA. pp. 51-60. https://doi.acm.org/10.1145/1179576.1179585
Abdullah, Kulsoom, Copeland, John A. (2006): Tool update: high alarm count issues in IDS rainstorm. In: Yurcik, William, Axelsson, Stefan, Lakkaraju, Kiran, Teoh, Soon Tee (eds.) VizSEC 2006 - 3rd Workshop on Visualization for Computer Security 3 November, 2006, Alexandria, Virginia, USA. pp. 61-62. https://doi.acm.org/10.1145/1179576.1179587
Yurcik, William (2006): Tool update: visflowconnect-IP with advanced filtering from usability testing. In: Yurcik, William, Axelsson, Stefan, Lakkaraju, Kiran, Teoh, Soon Tee (eds.) VizSEC 2006 - 3rd Workshop on Visualization for Computer Security 3 November, 2006, Alexandria, Virginia, USA. pp. 63-64. https://doi.acm.org/10.1145/1179576.1179588
Yurcik, William (2006): Tool update: NVisionIP improvements (difference view, sparklines, and shapes). In: Yurcik, William, Axelsson, Stefan, Lakkaraju, Kiran, Teoh, Soon Tee (eds.) VizSEC 2006 - 3rd Workshop on Visualization for Computer Security 3 November, 2006, Alexandria, Virginia, USA. pp. 65-66. https://doi.acm.org/10.1145/1179576.1179589
Ren, Pin (2006): Ensuring the continuing success of vizsec. In: Yurcik, William, Axelsson, Stefan, Lakkaraju, Kiran, Teoh, Soon Tee (eds.) VizSEC 2006 - 3rd Workshop on Visualization for Computer Security 3 November, 2006, Alexandria, Virginia, USA. pp. 67-70. https://doi.acm.org/10.1145/1179576.1179591
Li, L., Liu, P., Kesidis, George (2006): Visual toolkit for network security experiment specification and data analysis. In: Yurcik, William, Axelsson, Stefan, Lakkaraju, Kiran, Teoh, Soon Tee (eds.) VizSEC 2006 - 3rd Workshop on Visualization for Computer Security 3 November, 2006, Alexandria, Virginia, USA. pp. 7-14. https://doi.acm.org/10.1145/1179576.1179579
Oberheide, Jon, Karir, Manish, Blazakis, Dionysus (2006): VAST: visualizing autonomous system topology. In: Yurcik, William, Axelsson, Stefan, Lakkaraju, Kiran, Teoh, Soon Tee (eds.) VizSEC 2006 - 3rd Workshop on Visualization for Computer Security 3 November, 2006, Alexandria, Virginia, USA. pp. 71-80. https://doi.acm.org/10.1145/1179576.1179592
Teoh, Soon Tee, Ranjan, Supranamaya, Nucci, Antonio, Chuah, Chen-Nee (2006): BGP eye: a new visualization tool for real-time detection and analysis of BGP anomalies. In: Yurcik, William, Axelsson, Stefan, Lakkaraju, Kiran, Teoh, Soon Tee (eds.) VizSEC 2006 - 3rd Workshop on Visualization for Computer Security 3 November, 2006, Alexandria, Virginia, USA. pp. 81-90. https://doi.acm.org/10.1145/1179576.1179593
Schweitzer, Dino, III, Leemon C. Baird (2006): Discovering an RC4 anomaly through visualization. In: Yurcik, William, Axelsson, Stefan, Lakkaraju, Kiran, Teoh, Soon Tee (eds.) VizSEC 2006 - 3rd Workshop on Visualization for Computer Security 3 November, 2006, Alexandria, Virginia, USA. pp. 91-94. https://doi.acm.org/10.1145/1179576.1179595
Hertzog, Patrick (2006): Visualizations to improve reactivity towards security incidents inside corporate networks. In: Yurcik, William, Axelsson, Stefan, Lakkaraju, Kiran, Teoh, Soon Tee (eds.) VizSEC 2006 - 3rd Workshop on Visualization for Computer Security 3 November, 2006, Alexandria, Virginia, USA. pp. 95-102. https://doi.acm.org/10.1145/1179576.1179596