VizSEC 2006 - 3rd Workshop on Visualization for Computer Security
Conference Details
Year: 2006
Period: 3 November
Location: Alexandria, Virginia, USA
Publisher:
ACM Press
ISBN: 1-59593-549-5
Description
Networked computers are increasingly ubiquitous, and they are subject to attack, misuse, and abuse. Every effort is being made by organizations and individuals to build and maintain trustworthy computing systems. Traditional, signature-based and statistical methods are limited in their capability to cope with the large, evolving data and the dynamic nature of Internet. In many applications, visualization proves very effective to understand large high-dimensional data. Thus, there is a growing interest in the development of visualization methods as alternative or complementary solutions to the pressing cyber security problems.
Other Years in Series
Other proceedings in the VizSec - IEEE Workshop on Visualization for Computer Security series
Articles
Publications included in this conference proceedings
Mathew,
Sunu,
Giomundo,
Richard,
Upadhyaya,
Shambhu J.,
Sudit,
Moises,
Stotz,
Adam
(2006):
Understanding multistage attacks by attack-track based visualization of heterogeneous even.
In:
Yurcik,
William,
Axelsson,
Stefan,
Lakkaraju,
Kiran,
Teoh,
Soon Tee
(eds.)
VizSEC 2006 - 3rd Workshop on Visualization for Computer Security
3 November,
2006,
Alexandria, Virginia, USA.
pp. 1-6.
https://doi.acm.org/10.1145/1179576.1179578
Lee,
Christopher P.,
Copeland,
John A.
(2006):
Flowtag: a collaborative attack-analysis, reporting, and sharing tool for security researc.
In:
Yurcik,
William,
Axelsson,
Stefan,
Lakkaraju,
Kiran,
Teoh,
Soon Tee
(eds.)
VizSEC 2006 - 3rd Workshop on Visualization for Computer Security
3 November,
2006,
Alexandria, Virginia, USA.
pp. 103-108.
https://doi.acm.org/10.1145/1179576.1179597
Stephano,
Amanda L.,
Groth,
Dennis P.
(2006):
USEable security: interface design strategies for improving security.
In:
Yurcik,
William,
Axelsson,
Stefan,
Lakkaraju,
Kiran,
Teoh,
Soon Tee
(eds.)
VizSEC 2006 - 3rd Workshop on Visualization for Computer Security
3 November,
2006,
Alexandria, Virginia, USA.
pp. 109-116.
https://doi.acm.org/10.1145/1179576.1179598
Yee,
George
(2006):
Visualization for privacy compliance.
In:
Yurcik,
William,
Axelsson,
Stefan,
Lakkaraju,
Kiran,
Teoh,
Soon Tee
(eds.)
VizSEC 2006 - 3rd Workshop on Visualization for Computer Security
3 November,
2006,
Alexandria, Virginia, USA.
pp. 117-122.
https://doi.acm.org/10.1145/1179576.1179599
Malécot,
Erwan Le,
Kohara,
Masayoshi,
Hori,
Yoshiaki,
Sakurai,
Kouichi
(2006):
Interactively combining 2D and 3D visualization for network traffic monitoring.
In:
Yurcik,
William,
Axelsson,
Stefan,
Lakkaraju,
Kiran,
Teoh,
Soon Tee
(eds.)
VizSEC 2006 - 3rd Workshop on Visualization for Computer Security
3 November,
2006,
Alexandria, Virginia, USA.
pp. 123-127.
https://doi.acm.org/10.1145/1179576.1179600
Shabtai,
Asaf,
Klimov,
Denis,
Shahar,
Yuval,
Elovici,
Yuval
(2006):
An intelligent, interactive tool for exploration and visualization of time-oriented securi.
In:
Yurcik,
William,
Axelsson,
Stefan,
Lakkaraju,
Kiran,
Teoh,
Soon Tee
(eds.)
VizSEC 2006 - 3rd Workshop on Visualization for Computer Security
3 November,
2006,
Alexandria, Virginia, USA.
pp. 15-22.
https://doi.acm.org/10.1145/1179576.1179580
Ren,
Pin,
Kristoff,
John,
Gooch,
Bruce
(2006):
Visualizing DNS traffic.
In:
Yurcik,
William,
Axelsson,
Stefan,
Lakkaraju,
Kiran,
Teoh,
Soon Tee
(eds.)
VizSEC 2006 - 3rd Workshop on Visualization for Computer Security
3 November,
2006,
Alexandria, Virginia, USA.
pp. 23-30.
https://doi.acm.org/10.1145/1179576.1179582
Harrop,
Warren,
Armitage,
Grenville J.
(2006):
Real-time collaborative network monitoring and control using 3D game engines for represent.
In:
Yurcik,
William,
Axelsson,
Stefan,
Lakkaraju,
Kiran,
Teoh,
Soon Tee
(eds.)
VizSEC 2006 - 3rd Workshop on Visualization for Computer Security
3 November,
2006,
Alexandria, Virginia, USA.
pp. 31-40.
https://doi.acm.org/10.1145/1179576.1179583
Wright,
Charles V.,
Monrose,
Fabian,
Masson,
Gerald M.
(2006):
Using visual motifs to classify encrypted traffic.
In:
Yurcik,
William,
Axelsson,
Stefan,
Lakkaraju,
Kiran,
Teoh,
Soon Tee
(eds.)
VizSEC 2006 - 3rd Workshop on Visualization for Computer Security
3 November,
2006,
Alexandria, Virginia, USA.
pp. 41-50.
https://doi.acm.org/10.1145/1179576.1179584
Wang,
Weichao,
Lu,
Aidong
(2006):
Visualization assisted detection of sybil attacks in wireless networks.
In:
Yurcik,
William,
Axelsson,
Stefan,
Lakkaraju,
Kiran,
Teoh,
Soon Tee
(eds.)
VizSEC 2006 - 3rd Workshop on Visualization for Computer Security
3 November,
2006,
Alexandria, Virginia, USA.
pp. 51-60.
https://doi.acm.org/10.1145/1179576.1179585
Abdullah,
Kulsoom,
Copeland,
John A.
(2006):
Tool update: high alarm count issues in IDS rainstorm.
In:
Yurcik,
William,
Axelsson,
Stefan,
Lakkaraju,
Kiran,
Teoh,
Soon Tee
(eds.)
VizSEC 2006 - 3rd Workshop on Visualization for Computer Security
3 November,
2006,
Alexandria, Virginia, USA.
pp. 61-62.
https://doi.acm.org/10.1145/1179576.1179587
Yurcik,
William
(2006):
Tool update: visflowconnect-IP with advanced filtering from usability testing.
In:
Yurcik,
William,
Axelsson,
Stefan,
Lakkaraju,
Kiran,
Teoh,
Soon Tee
(eds.)
VizSEC 2006 - 3rd Workshop on Visualization for Computer Security
3 November,
2006,
Alexandria, Virginia, USA.
pp. 63-64.
https://doi.acm.org/10.1145/1179576.1179588
Yurcik,
William
(2006):
Tool update: NVisionIP improvements (difference view, sparklines, and shapes).
In:
Yurcik,
William,
Axelsson,
Stefan,
Lakkaraju,
Kiran,
Teoh,
Soon Tee
(eds.)
VizSEC 2006 - 3rd Workshop on Visualization for Computer Security
3 November,
2006,
Alexandria, Virginia, USA.
pp. 65-66.
https://doi.acm.org/10.1145/1179576.1179589
Ren,
Pin
(2006):
Ensuring the continuing success of vizsec.
In:
Yurcik,
William,
Axelsson,
Stefan,
Lakkaraju,
Kiran,
Teoh,
Soon Tee
(eds.)
VizSEC 2006 - 3rd Workshop on Visualization for Computer Security
3 November,
2006,
Alexandria, Virginia, USA.
pp. 67-70.
https://doi.acm.org/10.1145/1179576.1179591
Li,
L.,
Liu,
P.,
Kesidis,
George
(2006):
Visual toolkit for network security experiment specification and data analysis.
In:
Yurcik,
William,
Axelsson,
Stefan,
Lakkaraju,
Kiran,
Teoh,
Soon Tee
(eds.)
VizSEC 2006 - 3rd Workshop on Visualization for Computer Security
3 November,
2006,
Alexandria, Virginia, USA.
pp. 7-14.
https://doi.acm.org/10.1145/1179576.1179579
Oberheide,
Jon,
Karir,
Manish,
Blazakis,
Dionysus
(2006):
VAST: visualizing autonomous system topology.
In:
Yurcik,
William,
Axelsson,
Stefan,
Lakkaraju,
Kiran,
Teoh,
Soon Tee
(eds.)
VizSEC 2006 - 3rd Workshop on Visualization for Computer Security
3 November,
2006,
Alexandria, Virginia, USA.
pp. 71-80.
https://doi.acm.org/10.1145/1179576.1179592
Teoh,
Soon Tee,
Ranjan,
Supranamaya,
Nucci,
Antonio,
Chuah,
Chen-Nee
(2006):
BGP eye: a new visualization tool for real-time detection and analysis of BGP anomalies.
In:
Yurcik,
William,
Axelsson,
Stefan,
Lakkaraju,
Kiran,
Teoh,
Soon Tee
(eds.)
VizSEC 2006 - 3rd Workshop on Visualization for Computer Security
3 November,
2006,
Alexandria, Virginia, USA.
pp. 81-90.
https://doi.acm.org/10.1145/1179576.1179593
Schweitzer,
Dino,
III,
Leemon C. Baird
(2006):
Discovering an RC4 anomaly through visualization.
In:
Yurcik,
William,
Axelsson,
Stefan,
Lakkaraju,
Kiran,
Teoh,
Soon Tee
(eds.)
VizSEC 2006 - 3rd Workshop on Visualization for Computer Security
3 November,
2006,
Alexandria, Virginia, USA.
pp. 91-94.
https://doi.acm.org/10.1145/1179576.1179595
Hertzog,
Patrick
(2006):
Visualizations to improve reactivity towards security incidents inside corporate networks.
In:
Yurcik,
William,
Axelsson,
Stefan,
Lakkaraju,
Kiran,
Teoh,
Soon Tee
(eds.)
VizSEC 2006 - 3rd Workshop on Visualization for Computer Security
3 November,
2006,
Alexandria, Virginia, USA.
pp. 95-102.
https://doi.acm.org/10.1145/1179576.1179596