VizSec 2008 - Visualization for Computer Security, 5th International Workshop

Publisher
Springer
Website
Year
2008
Period
September 15
Place
Cambridge, MA, USA
ISBN
978-3-540-85931-4
Series
VizSec - IEEE Workshop on Visualization for Computer Security
DOI
Volume
Copyright info

Description

Networked computers are increasingly ubiquitous, and they are subject to attack, misuse, and abuse. Every effort is being made by organizations and individuals to build and maintain trustworthy computing systems. Traditional, signature-based and statistical methods are limited in their capability to cope with the large, evolving data and the dynamic nature of Internet. In many applications, visualization proves very effective to understand large high-dimensional data. Thus, there is a growing interest in the development of visualization methods as alternative or complementary solutions to the pressing cyber security problems.

All years

Articles

Conti, Gregory J., Dean, Erik, Sinda, Matthew, Sangster, Benjamin (2008): Visual Reverse Engineering of Binary and Data Files. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 1-17. https://dx.doi.org/10.1007/978-3-540-85933-8_1

Fischer, Fabian, Mansmann, Florian, Keim, Daniel A., Pietzko, Stephan, Waldvogel, Marcel (2008): Large-Scale Network Monitoring for Visual Analysis of Attacks. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 111-118. https://dx.doi.org/10.1007/978-3-540-85933-8_11

Blue, Ryan, Dunne, Cody, Fuchs, Adam, King, Kyle, Schulman, Aaron (2008): Visualizing Real-Time Network Resource Usage. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 119-135. https://dx.doi.org/10.1007/978-3-540-85933-8_12

Prole, Kenneth, Goodall, John R., D\'Amico, Anita D., Kopylec, Jason K. (2008): Wireless Cyber Assets Discovery Visualization. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 136-143. https://dx.doi.org/10.1007/978-3-540-85933-8_13

Minarík, Pavel, Dymácek, Tomás (2008): NetFlow Data Visualization Based on Graphs. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 144-151. https://dx.doi.org/10.1007/978-3-540-85933-8_14

Bratus, Sergey, Hansen, Axel, Pellacini, Fabio, Shubina, Anna (2008): Backhoe, a Packet Trace and Log Browser. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 152-160. https://dx.doi.org/10.1007/978-3-540-85933-8_15

Janies, Jeff (2008): Existence Plots: A Low-Resolution Time Series for Port Behavior Analysis. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 161-168. https://dx.doi.org/10.1007/978-3-540-85933-8_16

Musa, Shahrulniza, Parish, David J. (2008): Using Time Series 3D AlertGraph and False Alert Classification to Analyse Snort Alerts. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 169-180. https://dx.doi.org/10.1007/978-3-540-85933-8_17

Heitzmann, Alexander, Palazzi, Bernardo, Papamanthou, Charalampos, Tamassia, Roberto (2008): Effective Visualization of File System Access-Control. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 18-25. https://dx.doi.org/10.1007/978-3-540-85933-8_2

Vandenberghe, Grant (2008): Network Traffic Exploration Application: A Tool to Assess, Visualize, and Analyze Network . In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 181-196. https://dx.doi.org/10.1007/978-3-540-85933-8_18

Xia, Ying, Fairbanks, Kevin, Owen, Henry (2008): Visual Analysis of Program Flow Data with Data Propagation. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 26-35. https://dx.doi.org/10.1007/978-3-540-85933-8_3

Schwartz, Moses, Liebrock, Lorie M. (2008): A Term Distribution Visualization Approach to Digital Forensic String Search. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 36-43. https://dx.doi.org/10.1007/978-3-540-85933-8_4

Williams, Leevar, Lippmann, Richard, Ingols, Kyle (2008): GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 44-59. https://dx.doi.org/10.1007/978-3-540-85933-8_5

O\'Hare, Scott, Noel, Steven, Prole, Kenneth (2008): A Graph-Theoretic Visualization Approach to Network Risk Analysis. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 60-67. https://dx.doi.org/10.1007/978-3-540-85933-8_6

Homer, John, Varikuti, Ashok, Ou, Xinming, McQueen, Miles A. (2008): Improving Attack Graph Visualization through Data Reduction and Attack Grouping. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 68-79. https://dx.doi.org/10.1007/978-3-540-85933-8_7

Jankun-Kelly, T. J., Franck, Josh, Wilson, David, Carver, Jeffery, Dampier, David, Swan, J. Edward (2008): Show Me How You See: Lessons from Studying Computer Forensics Experts for Visualization. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 80-86. https://dx.doi.org/10.1007/978-3-540-85933-8_8

Suo, Xiaoyuan, Zhu, Ying, Owen, G. Scott (2008): A Task Centered Framework for Computer Security Data Visualization. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 87-94. https://dx.doi.org/10.1007/978-3-540-85933-8_9

Shearer, James, Ma, Kwan-Liu, Kohlenberg, Toby (2008): BGPeep: An IP-Space Centered View for Internet Routing Data. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 95-110. https://dx.doi.org/10.1007/978-3-540-85933-8_10

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
315,545 designers enjoy our newsletter—sure you don’t want to receive it?

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
315,545 designers enjoy our newsletter—sure you don’t want to receive it?