VizSec 2008 - Visualization for Computer Security, 5th International Workshop

Conference Details

Year: 2008
Period: September 15
Location: Cambridge, MA, USA
Publisher: Springer
ISBN: 978-3-540-85931-4

Description

Networked computers are increasingly ubiquitous, and they are subject to attack, misuse, and abuse. Every effort is being made by organizations and individuals to build and maintain trustworthy computing systems. Traditional, signature-based and statistical methods are limited in their capability to cope with the large, evolving data and the dynamic nature of Internet. In many applications, visualization proves very effective to understand large high-dimensional data. Thus, there is a growing interest in the development of visualization methods as alternative or complementary solutions to the pressing cyber security problems.

Other Years in Series

Other proceedings in the VizSec - IEEE Workshop on Visualization for Computer Security series

Articles

Publications included in this conference proceedings

Conti, Gregory J., Dean, Erik, Sinda, Matthew, Sangster, Benjamin (2008): Visual Reverse Engineering of Binary and Data Files. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 1-17. https://dx.doi.org/10.1007/978-3-540-85933-8_1
Fischer, Fabian, Mansmann, Florian, Keim, Daniel A., Pietzko, Stephan, Waldvogel, Marcel (2008): Large-Scale Network Monitoring for Visual Analysis of Attacks. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 111-118. https://dx.doi.org/10.1007/978-3-540-85933-8_11
Blue, Ryan, Dunne, Cody, Fuchs, Adam, King, Kyle, Schulman, Aaron (2008): Visualizing Real-Time Network Resource Usage. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 119-135. https://dx.doi.org/10.1007/978-3-540-85933-8_12
Prole, Kenneth, Goodall, John R., D\'Amico, Anita D., Kopylec, Jason K. (2008): Wireless Cyber Assets Discovery Visualization. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 136-143. https://dx.doi.org/10.1007/978-3-540-85933-8_13
Minarík, Pavel, Dymácek, Tomás (2008): NetFlow Data Visualization Based on Graphs. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 144-151. https://dx.doi.org/10.1007/978-3-540-85933-8_14
Bratus, Sergey, Hansen, Axel, Pellacini, Fabio, Shubina, Anna (2008): Backhoe, a Packet Trace and Log Browser. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 152-160. https://dx.doi.org/10.1007/978-3-540-85933-8_15
Janies, Jeff (2008): Existence Plots: A Low-Resolution Time Series for Port Behavior Analysis. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 161-168. https://dx.doi.org/10.1007/978-3-540-85933-8_16
Musa, Shahrulniza, Parish, David J. (2008): Using Time Series 3D AlertGraph and False Alert Classification to Analyse Snort Alerts. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 169-180. https://dx.doi.org/10.1007/978-3-540-85933-8_17
Heitzmann, Alexander, Palazzi, Bernardo, Papamanthou, Charalampos, Tamassia, Roberto (2008): Effective Visualization of File System Access-Control. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 18-25. https://dx.doi.org/10.1007/978-3-540-85933-8_2
Vandenberghe, Grant (2008): Network Traffic Exploration Application: A Tool to Assess, Visualize, and Analyze Network . In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 181-196. https://dx.doi.org/10.1007/978-3-540-85933-8_18
Xia, Ying, Fairbanks, Kevin, Owen, Henry (2008): Visual Analysis of Program Flow Data with Data Propagation. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 26-35. https://dx.doi.org/10.1007/978-3-540-85933-8_3
Schwartz, Moses, Liebrock, Lorie M. (2008): A Term Distribution Visualization Approach to Digital Forensic String Search. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 36-43. https://dx.doi.org/10.1007/978-3-540-85933-8_4
Williams, Leevar, Lippmann, Richard, Ingols, Kyle (2008): GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 44-59. https://dx.doi.org/10.1007/978-3-540-85933-8_5
O\'Hare, Scott, Noel, Steven, Prole, Kenneth (2008): A Graph-Theoretic Visualization Approach to Network Risk Analysis. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 60-67. https://dx.doi.org/10.1007/978-3-540-85933-8_6
Homer, John, Varikuti, Ashok, Ou, Xinming, McQueen, Miles A. (2008): Improving Attack Graph Visualization through Data Reduction and Attack Grouping. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 68-79. https://dx.doi.org/10.1007/978-3-540-85933-8_7
Jankun-Kelly, T. J., Franck, Josh, Wilson, David, Carver, Jeffery, Dampier, David, Swan, J. Edward (2008): Show Me How You See: Lessons from Studying Computer Forensics Experts for Visualization. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 80-86. https://dx.doi.org/10.1007/978-3-540-85933-8_8
Suo, Xiaoyuan, Zhu, Ying, Owen, G. Scott (2008): A Task Centered Framework for Computer Security Data Visualization. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 87-94. https://dx.doi.org/10.1007/978-3-540-85933-8_9
Shearer, James, Ma, Kwan-Liu, Kohlenberg, Toby (2008): BGPeep: An IP-Space Centered View for Internet Routing Data. In: Goodall, John R., Conti, Gregory J., Ma, Kwan-Liu (eds.) VizSec 2008 - Visualization for Computer Security, 5th International Workshop September 15, 2008, Cambridge, MA, USA. pp. 95-110. https://dx.doi.org/10.1007/978-3-540-85933-8_10
Privacy Settings
By using this site, you accept our Cookie Policy and Terms of Use.
Customize
Accept all

Feel Stuck? Want Freedom?

Join 326,062+ designers who get one powerful email each week. Learn to design a life you love.

Next email in
0
days
22
hrs
14
mins
44
secs

Free forever. No spam. Unsubscribe anytime.