VizSec 2008 - Visualization for Computer Security, 5th International Workshop
- Publisher
- Springer
- Website
- Year
- 2008
- Period
- September 15
- Place
- Cambridge, MA, USA
- ISBN
- 978-3-540-85931-4
- Series
- VizSec - IEEE Workshop on Visualization for Computer Security
- DOI
- Volume
- Copyright info
Description
All years
Articles
Conti, Gregory J., Dean, Erik, Sinda, Matthew, Sangster, Benjamin (2008): Visual Reverse Engineering of Binary and Data Files. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 1-17. https://dx.doi.org/10.1007/978-3-540-85933-8_1
Fischer, Fabian, Mansmann, Florian, Keim, Daniel A., Pietzko, Stephan, Waldvogel, Marcel (2008): Large-Scale Network Monitoring for Visual Analysis of Attacks. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 111-118. https://dx.doi.org/10.1007/978-3-540-85933-8_11
Blue, Ryan, Dunne, Cody, Fuchs, Adam, King, Kyle, Schulman, Aaron (2008): Visualizing Real-Time Network Resource Usage. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 119-135. https://dx.doi.org/10.1007/978-3-540-85933-8_12
Prole, Kenneth, Goodall, John R., D\'Amico, Anita D., Kopylec, Jason K. (2008): Wireless Cyber Assets Discovery Visualization. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 136-143. https://dx.doi.org/10.1007/978-3-540-85933-8_13
Minarík, Pavel, Dymácek, Tomás (2008): NetFlow Data Visualization Based on Graphs. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 144-151. https://dx.doi.org/10.1007/978-3-540-85933-8_14
Bratus, Sergey, Hansen, Axel, Pellacini, Fabio, Shubina, Anna (2008): Backhoe, a Packet Trace and Log Browser. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 152-160. https://dx.doi.org/10.1007/978-3-540-85933-8_15
Janies, Jeff (2008): Existence Plots: A Low-Resolution Time Series for Port Behavior Analysis. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 161-168. https://dx.doi.org/10.1007/978-3-540-85933-8_16
Musa, Shahrulniza, Parish, David J. (2008): Using Time Series 3D AlertGraph and False Alert Classification to Analyse Snort Alerts. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 169-180. https://dx.doi.org/10.1007/978-3-540-85933-8_17
Heitzmann, Alexander, Palazzi, Bernardo, Papamanthou, Charalampos, Tamassia, Roberto (2008): Effective Visualization of File System Access-Control. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 18-25. https://dx.doi.org/10.1007/978-3-540-85933-8_2
Vandenberghe, Grant (2008): Network Traffic Exploration Application: A Tool to Assess, Visualize, and Analyze Network . In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 181-196. https://dx.doi.org/10.1007/978-3-540-85933-8_18
Xia, Ying, Fairbanks, Kevin, Owen, Henry (2008): Visual Analysis of Program Flow Data with Data Propagation. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 26-35. https://dx.doi.org/10.1007/978-3-540-85933-8_3
Schwartz, Moses, Liebrock, Lorie M. (2008): A Term Distribution Visualization Approach to Digital Forensic String Search. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 36-43. https://dx.doi.org/10.1007/978-3-540-85933-8_4
Williams, Leevar, Lippmann, Richard, Ingols, Kyle (2008): GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 44-59. https://dx.doi.org/10.1007/978-3-540-85933-8_5
O\'Hare, Scott, Noel, Steven, Prole, Kenneth (2008): A Graph-Theoretic Visualization Approach to Network Risk Analysis. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 60-67. https://dx.doi.org/10.1007/978-3-540-85933-8_6
Homer, John, Varikuti, Ashok, Ou, Xinming, McQueen, Miles A. (2008): Improving Attack Graph Visualization through Data Reduction and Attack Grouping. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 68-79. https://dx.doi.org/10.1007/978-3-540-85933-8_7
Jankun-Kelly, T. J., Franck, Josh, Wilson, David, Carver, Jeffery, Dampier, David, Swan, J. Edward (2008): Show Me How You See: Lessons from Studying Computer Forensics Experts for Visualization. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 80-86. https://dx.doi.org/10.1007/978-3-540-85933-8_8
Suo, Xiaoyuan, Zhu, Ying, Owen, G. Scott (2008): A Task Centered Framework for Computer Security Data Visualization. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 87-94. https://dx.doi.org/10.1007/978-3-540-85933-8_9
Shearer, James, Ma, Kwan-Liu, Kohlenberg, Toby (2008): BGPeep: An IP-Space Centered View for Internet Routing Data. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 95-110. https://dx.doi.org/10.1007/978-3-540-85933-8_10