VizSec 2008 - Visualization for Computer Security, 5th International Workshop
Conference Details
Year: 2008
Period: September 15
Location: Cambridge, MA, USA
Publisher:
Springer
ISBN: 978-3-540-85931-4
Description
Networked computers are increasingly ubiquitous, and they are subject to attack, misuse, and abuse. Every effort is being made by organizations and individuals to build and maintain trustworthy computing systems. Traditional, signature-based and statistical methods are limited in their capability to cope with the large, evolving data and the dynamic nature of Internet. In many applications, visualization proves very effective to understand large high-dimensional data. Thus, there is a growing interest in the development of visualization methods as alternative or complementary solutions to the pressing cyber security problems.
Other Years in Series
Other proceedings in the VizSec - IEEE Workshop on Visualization for Computer Security series
Articles
Publications included in this conference proceedings
Conti,
Gregory J.,
Dean,
Erik,
Sinda,
Matthew,
Sangster,
Benjamin
(2008):
Visual Reverse Engineering of Binary and Data Files.
In:
Goodall,
John R.,
Conti,
Gregory J.,
Ma,
Kwan-Liu
(eds.)
VizSec 2008 - Visualization for Computer Security, 5th International Workshop
September 15,
2008,
Cambridge, MA, USA.
pp. 1-17.
https://dx.doi.org/10.1007/978-3-540-85933-8_1
Fischer,
Fabian,
Mansmann,
Florian,
Keim,
Daniel A.,
Pietzko,
Stephan,
Waldvogel,
Marcel
(2008):
Large-Scale Network Monitoring for Visual Analysis of Attacks.
In:
Goodall,
John R.,
Conti,
Gregory J.,
Ma,
Kwan-Liu
(eds.)
VizSec 2008 - Visualization for Computer Security, 5th International Workshop
September 15,
2008,
Cambridge, MA, USA.
pp. 111-118.
https://dx.doi.org/10.1007/978-3-540-85933-8_11
Blue,
Ryan,
Dunne,
Cody,
Fuchs,
Adam,
King,
Kyle,
Schulman,
Aaron
(2008):
Visualizing Real-Time Network Resource Usage.
In:
Goodall,
John R.,
Conti,
Gregory J.,
Ma,
Kwan-Liu
(eds.)
VizSec 2008 - Visualization for Computer Security, 5th International Workshop
September 15,
2008,
Cambridge, MA, USA.
pp. 119-135.
https://dx.doi.org/10.1007/978-3-540-85933-8_12
Prole,
Kenneth,
Goodall,
John R.,
D\'Amico,
Anita D.,
Kopylec,
Jason K.
(2008):
Wireless Cyber Assets Discovery Visualization.
In:
Goodall,
John R.,
Conti,
Gregory J.,
Ma,
Kwan-Liu
(eds.)
VizSec 2008 - Visualization for Computer Security, 5th International Workshop
September 15,
2008,
Cambridge, MA, USA.
pp. 136-143.
https://dx.doi.org/10.1007/978-3-540-85933-8_13
Minarík,
Pavel,
Dymácek,
Tomás
(2008):
NetFlow Data Visualization Based on Graphs.
In:
Goodall,
John R.,
Conti,
Gregory J.,
Ma,
Kwan-Liu
(eds.)
VizSec 2008 - Visualization for Computer Security, 5th International Workshop
September 15,
2008,
Cambridge, MA, USA.
pp. 144-151.
https://dx.doi.org/10.1007/978-3-540-85933-8_14
Bratus,
Sergey,
Hansen,
Axel,
Pellacini,
Fabio,
Shubina,
Anna
(2008):
Backhoe, a Packet Trace and Log Browser.
In:
Goodall,
John R.,
Conti,
Gregory J.,
Ma,
Kwan-Liu
(eds.)
VizSec 2008 - Visualization for Computer Security, 5th International Workshop
September 15,
2008,
Cambridge, MA, USA.
pp. 152-160.
https://dx.doi.org/10.1007/978-3-540-85933-8_15
Janies,
Jeff
(2008):
Existence Plots: A Low-Resolution Time Series for Port Behavior Analysis.
In:
Goodall,
John R.,
Conti,
Gregory J.,
Ma,
Kwan-Liu
(eds.)
VizSec 2008 - Visualization for Computer Security, 5th International Workshop
September 15,
2008,
Cambridge, MA, USA.
pp. 161-168.
https://dx.doi.org/10.1007/978-3-540-85933-8_16
Musa,
Shahrulniza,
Parish,
David J.
(2008):
Using Time Series 3D AlertGraph and False Alert Classification to Analyse Snort Alerts.
In:
Goodall,
John R.,
Conti,
Gregory J.,
Ma,
Kwan-Liu
(eds.)
VizSec 2008 - Visualization for Computer Security, 5th International Workshop
September 15,
2008,
Cambridge, MA, USA.
pp. 169-180.
https://dx.doi.org/10.1007/978-3-540-85933-8_17
Heitzmann,
Alexander,
Palazzi,
Bernardo,
Papamanthou,
Charalampos,
Tamassia,
Roberto
(2008):
Effective Visualization of File System Access-Control.
In:
Goodall,
John R.,
Conti,
Gregory J.,
Ma,
Kwan-Liu
(eds.)
VizSec 2008 - Visualization for Computer Security, 5th International Workshop
September 15,
2008,
Cambridge, MA, USA.
pp. 18-25.
https://dx.doi.org/10.1007/978-3-540-85933-8_2
Vandenberghe,
Grant
(2008):
Network Traffic Exploration Application: A Tool to Assess, Visualize, and Analyze Network .
In:
Goodall,
John R.,
Conti,
Gregory J.,
Ma,
Kwan-Liu
(eds.)
VizSec 2008 - Visualization for Computer Security, 5th International Workshop
September 15,
2008,
Cambridge, MA, USA.
pp. 181-196.
https://dx.doi.org/10.1007/978-3-540-85933-8_18
Xia,
Ying,
Fairbanks,
Kevin,
Owen,
Henry
(2008):
Visual Analysis of Program Flow Data with Data Propagation.
In:
Goodall,
John R.,
Conti,
Gregory J.,
Ma,
Kwan-Liu
(eds.)
VizSec 2008 - Visualization for Computer Security, 5th International Workshop
September 15,
2008,
Cambridge, MA, USA.
pp. 26-35.
https://dx.doi.org/10.1007/978-3-540-85933-8_3
Schwartz,
Moses,
Liebrock,
Lorie M.
(2008):
A Term Distribution Visualization Approach to Digital Forensic String Search.
In:
Goodall,
John R.,
Conti,
Gregory J.,
Ma,
Kwan-Liu
(eds.)
VizSec 2008 - Visualization for Computer Security, 5th International Workshop
September 15,
2008,
Cambridge, MA, USA.
pp. 36-43.
https://dx.doi.org/10.1007/978-3-540-85933-8_4
Williams,
Leevar,
Lippmann,
Richard,
Ingols,
Kyle
(2008):
GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool.
In:
Goodall,
John R.,
Conti,
Gregory J.,
Ma,
Kwan-Liu
(eds.)
VizSec 2008 - Visualization for Computer Security, 5th International Workshop
September 15,
2008,
Cambridge, MA, USA.
pp. 44-59.
https://dx.doi.org/10.1007/978-3-540-85933-8_5
O\'Hare,
Scott,
Noel,
Steven,
Prole,
Kenneth
(2008):
A Graph-Theoretic Visualization Approach to Network Risk Analysis.
In:
Goodall,
John R.,
Conti,
Gregory J.,
Ma,
Kwan-Liu
(eds.)
VizSec 2008 - Visualization for Computer Security, 5th International Workshop
September 15,
2008,
Cambridge, MA, USA.
pp. 60-67.
https://dx.doi.org/10.1007/978-3-540-85933-8_6
Homer,
John,
Varikuti,
Ashok,
Ou,
Xinming,
McQueen,
Miles A.
(2008):
Improving Attack Graph Visualization through Data Reduction and Attack Grouping.
In:
Goodall,
John R.,
Conti,
Gregory J.,
Ma,
Kwan-Liu
(eds.)
VizSec 2008 - Visualization for Computer Security, 5th International Workshop
September 15,
2008,
Cambridge, MA, USA.
pp. 68-79.
https://dx.doi.org/10.1007/978-3-540-85933-8_7
Jankun-Kelly,
T. J.,
Franck,
Josh,
Wilson,
David,
Carver,
Jeffery,
Dampier,
David,
Swan,
J. Edward
(2008):
Show Me How You See: Lessons from Studying Computer Forensics Experts for Visualization.
In:
Goodall,
John R.,
Conti,
Gregory J.,
Ma,
Kwan-Liu
(eds.)
VizSec 2008 - Visualization for Computer Security, 5th International Workshop
September 15,
2008,
Cambridge, MA, USA.
pp. 80-86.
https://dx.doi.org/10.1007/978-3-540-85933-8_8
Suo,
Xiaoyuan,
Zhu,
Ying,
Owen,
G. Scott
(2008):
A Task Centered Framework for Computer Security Data Visualization.
In:
Goodall,
John R.,
Conti,
Gregory J.,
Ma,
Kwan-Liu
(eds.)
VizSec 2008 - Visualization for Computer Security, 5th International Workshop
September 15,
2008,
Cambridge, MA, USA.
pp. 87-94.
https://dx.doi.org/10.1007/978-3-540-85933-8_9
Shearer,
James,
Ma,
Kwan-Liu,
Kohlenberg,
Toby
(2008):
BGPeep: An IP-Space Centered View for Internet Routing Data.
In:
Goodall,
John R.,
Conti,
Gregory J.,
Ma,
Kwan-Liu
(eds.)
VizSec 2008 - Visualization for Computer Security, 5th International Workshop
September 15,
2008,
Cambridge, MA, USA.
pp. 95-110.
https://dx.doi.org/10.1007/978-3-540-85933-8_10