VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security
- Publisher
- ACM Press
- Website
- Year
- 2004
- Period
- 29 October
- Place
- Washington DC, USA
- ISBN
- 1-58113-974-8
- Series
- VizSec - IEEE Workshop on Visualization for Computer Security
- DOI
- Volume
- Copyright info
Description
All years
Articles
Pusara, Maja, Brodley, Carla E. (2004): User re-authentication via mouse movements. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 1-8. https://doi.acm.org/10.1145/1029208.1029210
Noel, Steven, Jajodia, Sushil (2004): Managing attack graph complexity through visual hierarchical aggregation. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 109-118. https://doi.acm.org/10.1145/1029208.1029225
Goldring, Thomas (2004): Scatter (and other) plots for visualizing user profiling data and network traffic. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 119-123. https://doi.acm.org/10.1145/1029208.1029227
Valdes, Alfonso, Fong, Martin W. (2004): Scalable visualization of propagating internet phenomena. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 124-127. https://doi.acm.org/10.1145/1029208.1029228
Li, Wei-Jen, Hershkop, Shlomo, Stolfo, Salvatore J. (2004): Email archive analysis through graphical visualization. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 128-132. https://doi.acm.org/10.1145/1029208.1029229
Yurcik, William, Meng, Xin, Kiyanclar, Nadir (2004): NVisionCC: a visualization framework for high performance cluster security. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 133-137. https://doi.acm.org/10.1145/1029208.1029230
Colombe, Jeffrey B., Stephens, Gregory (2004): Statistical profiling and visualization for detection of malicious insider attacks on comp. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 138-142. https://doi.acm.org/10.1145/1029208.1029231
Koike, Hideki, Ohno, Kazuhiro (2004): SnortView: visualization system of snort logs. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 143-147. https://doi.acm.org/10.1145/1029208.1029232
Tandon, Gaurav, Chan, Philip K., Mitra, Debasis (2004): MORPHEUS: motif oriented representations to purge hostile events from unlabeled sequences. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 16-25. https://doi.acm.org/10.1145/1029208.1029212
Yin, Xiaoxin, Yurcik, William, Treaster, Michael, Li, Yifan, Lakkaraju, Kiran (2004): VisFlowConnect: netflow visualizations of link relationships for security situational awar. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 26-34. https://doi.acm.org/10.1145/1029208.1029214
Teoh, Soon Tee, Zhang, Ke, Tseng, Shih-Ming, Ma, Kwan-Liu, Wu, Shyhtsun Felix (2004): Combining visual and automated data mining for near-real-time anomaly detection and analys. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 35-44. https://doi.acm.org/10.1145/1029208.1029215
Conti, Gregory J., Abdullah, Kulsoom (2004): Passive visual fingerprinting of network attack tools. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 45-54. https://doi.acm.org/10.1145/1029208.1029216
Ball, Robert, Fink, Glenn A., North, Chris (2004): Home-centric visualization of network traffic for security administration. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 55-64. https://doi.acm.org/10.1145/1029208.1029217
Lakkaraju, Kiran, Yurcik, William, Lee, Adam J. (2004): NVisionIP: netflow visualizations of system state for security situational awareness. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 65-72. https://doi.acm.org/10.1145/1029208.1029219
McPherson, Jonathan, Ma, Kwan-Liu, Krystosk, Paul, Bartoletti, Tony, Christensen, Marvin (2004): PortVis: a tool for port-based detection of security events. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 73-81. https://doi.acm.org/10.1145/1029208.1029220
Yoo, InSeon (2004): Visualizing windows executable viruses using self-organizing maps. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 82-89. https://doi.acm.org/10.1145/1029208.1029222
Wright, Charles V., Monrose, Fabian, Masson, Gerald M. (2004): HMM profiles for network traffic classification. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 9-15. https://doi.acm.org/10.1145/1029208.1029211
Papadopoulos, Christos, Kyriakakis, Chris, Sawchuk, Alexander A., He, Xinming (2004): CyberSeer: 3D audio-visual immersion for network security and management. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 90-98. https://doi.acm.org/10.1145/1029208.1029223
Axelsson, Stefan (2004): Combining a bayesian classifier with visualisation: understanding the IDS. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 99-108. https://doi.acm.org/10.1145/1029208.1029224