VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security
Conference Details
Description
Networked computers are increasingly ubiquitous, and they are subject to attack, misuse, and abuse. Every effort is being made by organizations and individuals to build and maintain trustworthy computing systems. Traditional, signature-based and statistical methods are limited in their capability to cope with the large, evolving data and the dynamic nature of Internet. In many applications, visualization proves very effective to understand large high-dimensional data. Thus, there is a growing interest in the development of visualization methods as alternative or complementary solutions to the pressing cyber security problems.
Other Years in Series
Other proceedings in the VizSec - IEEE Workshop on Visualization for Computer Security series
Articles
Publications included in this conference proceedings
Pusara,
Maja,
Brodley,
Carla E.
(2004):
User re-authentication via mouse movements.
In:
Brodley,
Carla E.,
Chan,
Philip,
Lippman,
Richard,
Yurcik,
William
(eds.)
VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security
29 October,
2004,
Washington DC, USA.
pp. 1-8.
https://doi.acm.org/10.1145/1029208.1029210
Noel,
Steven,
Jajodia,
Sushil
(2004):
Managing attack graph complexity through visual hierarchical aggregation.
In:
Brodley,
Carla E.,
Chan,
Philip,
Lippman,
Richard,
Yurcik,
William
(eds.)
VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security
29 October,
2004,
Washington DC, USA.
pp. 109-118.
https://doi.acm.org/10.1145/1029208.1029225
Goldring,
Thomas
(2004):
Scatter (and other) plots for visualizing user profiling data and network traffic.
In:
Brodley,
Carla E.,
Chan,
Philip,
Lippman,
Richard,
Yurcik,
William
(eds.)
VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security
29 October,
2004,
Washington DC, USA.
pp. 119-123.
https://doi.acm.org/10.1145/1029208.1029227
Valdes,
Alfonso,
Fong,
Martin W.
(2004):
Scalable visualization of propagating internet phenomena.
In:
Brodley,
Carla E.,
Chan,
Philip,
Lippman,
Richard,
Yurcik,
William
(eds.)
VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security
29 October,
2004,
Washington DC, USA.
pp. 124-127.
https://doi.acm.org/10.1145/1029208.1029228
Li,
Wei-Jen,
Hershkop,
Shlomo,
Stolfo,
Salvatore J.
(2004):
Email archive analysis through graphical visualization.
In:
Brodley,
Carla E.,
Chan,
Philip,
Lippman,
Richard,
Yurcik,
William
(eds.)
VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security
29 October,
2004,
Washington DC, USA.
pp. 128-132.
https://doi.acm.org/10.1145/1029208.1029229
Yurcik,
William,
Meng,
Xin,
Kiyanclar,
Nadir
(2004):
NVisionCC: a visualization framework for high performance cluster security.
In:
Brodley,
Carla E.,
Chan,
Philip,
Lippman,
Richard,
Yurcik,
William
(eds.)
VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security
29 October,
2004,
Washington DC, USA.
pp. 133-137.
https://doi.acm.org/10.1145/1029208.1029230
Colombe,
Jeffrey B.,
Stephens,
Gregory
(2004):
Statistical profiling and visualization for detection of malicious insider attacks on comp.
In:
Brodley,
Carla E.,
Chan,
Philip,
Lippman,
Richard,
Yurcik,
William
(eds.)
VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security
29 October,
2004,
Washington DC, USA.
pp. 138-142.
https://doi.acm.org/10.1145/1029208.1029231
Koike,
Hideki,
Ohno,
Kazuhiro
(2004):
SnortView: visualization system of snort logs.
In:
Brodley,
Carla E.,
Chan,
Philip,
Lippman,
Richard,
Yurcik,
William
(eds.)
VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security
29 October,
2004,
Washington DC, USA.
pp. 143-147.
https://doi.acm.org/10.1145/1029208.1029232
Tandon,
Gaurav,
Chan,
Philip K.,
Mitra,
Debasis
(2004):
MORPHEUS: motif oriented representations to purge hostile events from unlabeled sequences.
In:
Brodley,
Carla E.,
Chan,
Philip,
Lippman,
Richard,
Yurcik,
William
(eds.)
VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security
29 October,
2004,
Washington DC, USA.
pp. 16-25.
https://doi.acm.org/10.1145/1029208.1029212
Yin,
Xiaoxin,
Yurcik,
William,
Treaster,
Michael,
Li,
Yifan,
Lakkaraju,
Kiran
(2004):
VisFlowConnect: netflow visualizations of link relationships for security situational awar.
In:
Brodley,
Carla E.,
Chan,
Philip,
Lippman,
Richard,
Yurcik,
William
(eds.)
VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security
29 October,
2004,
Washington DC, USA.
pp. 26-34.
https://doi.acm.org/10.1145/1029208.1029214
Teoh,
Soon Tee,
Zhang,
Ke,
Tseng,
Shih-Ming,
Ma,
Kwan-Liu,
Wu,
Shyhtsun Felix
(2004):
Combining visual and automated data mining for near-real-time anomaly detection and analys.
In:
Brodley,
Carla E.,
Chan,
Philip,
Lippman,
Richard,
Yurcik,
William
(eds.)
VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security
29 October,
2004,
Washington DC, USA.
pp. 35-44.
https://doi.acm.org/10.1145/1029208.1029215
Conti,
Gregory J.,
Abdullah,
Kulsoom
(2004):
Passive visual fingerprinting of network attack tools.
In:
Brodley,
Carla E.,
Chan,
Philip,
Lippman,
Richard,
Yurcik,
William
(eds.)
VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security
29 October,
2004,
Washington DC, USA.
pp. 45-54.
https://doi.acm.org/10.1145/1029208.1029216
Ball,
Robert,
Fink,
Glenn A.,
North,
Chris
(2004):
Home-centric visualization of network traffic for security administration.
In:
Brodley,
Carla E.,
Chan,
Philip,
Lippman,
Richard,
Yurcik,
William
(eds.)
VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security
29 October,
2004,
Washington DC, USA.
pp. 55-64.
https://doi.acm.org/10.1145/1029208.1029217
Lakkaraju,
Kiran,
Yurcik,
William,
Lee,
Adam J.
(2004):
NVisionIP: netflow visualizations of system state for security situational awareness.
In:
Brodley,
Carla E.,
Chan,
Philip,
Lippman,
Richard,
Yurcik,
William
(eds.)
VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security
29 October,
2004,
Washington DC, USA.
pp. 65-72.
https://doi.acm.org/10.1145/1029208.1029219
McPherson,
Jonathan,
Ma,
Kwan-Liu,
Krystosk,
Paul,
Bartoletti,
Tony,
Christensen,
Marvin
(2004):
PortVis: a tool for port-based detection of security events.
In:
Brodley,
Carla E.,
Chan,
Philip,
Lippman,
Richard,
Yurcik,
William
(eds.)
VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security
29 October,
2004,
Washington DC, USA.
pp. 73-81.
https://doi.acm.org/10.1145/1029208.1029220
Yoo,
InSeon
(2004):
Visualizing windows executable viruses using self-organizing maps.
In:
Brodley,
Carla E.,
Chan,
Philip,
Lippman,
Richard,
Yurcik,
William
(eds.)
VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security
29 October,
2004,
Washington DC, USA.
pp. 82-89.
https://doi.acm.org/10.1145/1029208.1029222
Wright,
Charles V.,
Monrose,
Fabian,
Masson,
Gerald M.
(2004):
HMM profiles for network traffic classification.
In:
Brodley,
Carla E.,
Chan,
Philip,
Lippman,
Richard,
Yurcik,
William
(eds.)
VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security
29 October,
2004,
Washington DC, USA.
pp. 9-15.
https://doi.acm.org/10.1145/1029208.1029211
Papadopoulos,
Christos,
Kyriakakis,
Chris,
Sawchuk,
Alexander A.,
He,
Xinming
(2004):
CyberSeer: 3D audio-visual immersion for network security and management.
In:
Brodley,
Carla E.,
Chan,
Philip,
Lippman,
Richard,
Yurcik,
William
(eds.)
VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security
29 October,
2004,
Washington DC, USA.
pp. 90-98.
https://doi.acm.org/10.1145/1029208.1029223
Axelsson,
Stefan
(2004):
Combining a bayesian classifier with visualisation: understanding the IDS.
In:
Brodley,
Carla E.,
Chan,
Philip,
Lippman,
Richard,
Yurcik,
William
(eds.)
VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security
29 October,
2004,
Washington DC, USA.
pp. 99-108.
https://doi.acm.org/10.1145/1029208.1029224