VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security

Conference Details

Year: 2004
Period: 29 October
Location: Washington DC, USA
Publisher: ACM Press
ISBN: 1-58113-974-8

Description

Networked computers are increasingly ubiquitous, and they are subject to attack, misuse, and abuse. Every effort is being made by organizations and individuals to build and maintain trustworthy computing systems. Traditional, signature-based and statistical methods are limited in their capability to cope with the large, evolving data and the dynamic nature of Internet. In many applications, visualization proves very effective to understand large high-dimensional data. Thus, there is a growing interest in the development of visualization methods as alternative or complementary solutions to the pressing cyber security problems.

Other Years in Series

Other proceedings in the VizSec - IEEE Workshop on Visualization for Computer Security series

Articles

Publications included in this conference proceedings

Pusara, Maja, Brodley, Carla E. (2004): User re-authentication via mouse movements. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 1-8. https://doi.acm.org/10.1145/1029208.1029210
Noel, Steven, Jajodia, Sushil (2004): Managing attack graph complexity through visual hierarchical aggregation. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 109-118. https://doi.acm.org/10.1145/1029208.1029225
Goldring, Thomas (2004): Scatter (and other) plots for visualizing user profiling data and network traffic. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 119-123. https://doi.acm.org/10.1145/1029208.1029227
Valdes, Alfonso, Fong, Martin W. (2004): Scalable visualization of propagating internet phenomena. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 124-127. https://doi.acm.org/10.1145/1029208.1029228
Li, Wei-Jen, Hershkop, Shlomo, Stolfo, Salvatore J. (2004): Email archive analysis through graphical visualization. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 128-132. https://doi.acm.org/10.1145/1029208.1029229
Yurcik, William, Meng, Xin, Kiyanclar, Nadir (2004): NVisionCC: a visualization framework for high performance cluster security. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 133-137. https://doi.acm.org/10.1145/1029208.1029230
Colombe, Jeffrey B., Stephens, Gregory (2004): Statistical profiling and visualization for detection of malicious insider attacks on comp. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 138-142. https://doi.acm.org/10.1145/1029208.1029231
Koike, Hideki, Ohno, Kazuhiro (2004): SnortView: visualization system of snort logs. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 143-147. https://doi.acm.org/10.1145/1029208.1029232
Tandon, Gaurav, Chan, Philip K., Mitra, Debasis (2004): MORPHEUS: motif oriented representations to purge hostile events from unlabeled sequences. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 16-25. https://doi.acm.org/10.1145/1029208.1029212
Yin, Xiaoxin, Yurcik, William, Treaster, Michael, Li, Yifan, Lakkaraju, Kiran (2004): VisFlowConnect: netflow visualizations of link relationships for security situational awar. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 26-34. https://doi.acm.org/10.1145/1029208.1029214
Teoh, Soon Tee, Zhang, Ke, Tseng, Shih-Ming, Ma, Kwan-Liu, Wu, Shyhtsun Felix (2004): Combining visual and automated data mining for near-real-time anomaly detection and analys. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 35-44. https://doi.acm.org/10.1145/1029208.1029215
Conti, Gregory J., Abdullah, Kulsoom (2004): Passive visual fingerprinting of network attack tools. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 45-54. https://doi.acm.org/10.1145/1029208.1029216
Ball, Robert, Fink, Glenn A., North, Chris (2004): Home-centric visualization of network traffic for security administration. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 55-64. https://doi.acm.org/10.1145/1029208.1029217
Lakkaraju, Kiran, Yurcik, William, Lee, Adam J. (2004): NVisionIP: netflow visualizations of system state for security situational awareness. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 65-72. https://doi.acm.org/10.1145/1029208.1029219
McPherson, Jonathan, Ma, Kwan-Liu, Krystosk, Paul, Bartoletti, Tony, Christensen, Marvin (2004): PortVis: a tool for port-based detection of security events. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 73-81. https://doi.acm.org/10.1145/1029208.1029220
Yoo, InSeon (2004): Visualizing windows executable viruses using self-organizing maps. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 82-89. https://doi.acm.org/10.1145/1029208.1029222
Wright, Charles V., Monrose, Fabian, Masson, Gerald M. (2004): HMM profiles for network traffic classification. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 9-15. https://doi.acm.org/10.1145/1029208.1029211
Papadopoulos, Christos, Kyriakakis, Chris, Sawchuk, Alexander A., He, Xinming (2004): CyberSeer: 3D audio-visual immersion for network security and management. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 90-98. https://doi.acm.org/10.1145/1029208.1029223
Axelsson, Stefan (2004): Combining a bayesian classifier with visualisation: understanding the IDS. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 99-108. https://doi.acm.org/10.1145/1029208.1029224
Privacy Settings
By using this site, you accept our Cookie Policy and Terms of Use.
Customize
Accept all

Feel Stuck? Want Freedom?

Join 326,058+ designers who get one powerful email each week. Learn to design a life you love.

Next email in
1
day
0
hrs
36
mins
21
secs

Free forever. No spam. Unsubscribe anytime.