VizSEC 2008:
Cambridge,
MA,
USA
John R. Goodall, Gregory J. Conti, Kwan-Liu Ma (Eds.):
Visualization for Computer Security, 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings.
Lecture Notes in Computer Science 5210 Springer 2008, ISBN 978-3-540-85931-4 BibTeX
- Gregory J. Conti, Erik Dean, Matthew Sinda, Benjamin Sangster:
Visual Reverse Engineering of Binary and Data Files.
1-17
Electronic Edition (link) BibTeX
- Alexander Heitzmann, Bernardo Palazzi, Charalampos Papamanthou, Roberto Tamassia:
Effective Visualization of File System Access-Control.
18-25
Electronic Edition (link) BibTeX
- Ying Xia, Kevin Fairbanks, Henry Owen:
Visual Analysis of Program Flow Data with Data Propagation.
26-35
Electronic Edition (link) BibTeX
- Moses Schwartz, Lorie M. Liebrock:
A Term Distribution Visualization Approach to Digital Forensic String Search.
36-43
Electronic Edition (link) BibTeX
- Leevar Williams, Richard Lippmann, Kyle Ingols:
GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool.
44-59
Electronic Edition (link) BibTeX
- Scott O'Hare, Steven Noel, Kenneth Prole:
A Graph-Theoretic Visualization Approach to Network Risk Analysis.
60-67
Electronic Edition (link) BibTeX
- John Homer, Ashok Varikuti, Xinming Ou, Miles A. McQueen:
Improving Attack Graph Visualization through Data Reduction and Attack Grouping.
68-79
Electronic Edition (link) BibTeX
- T. J. Jankun-Kelly, Josh Franck, David Wilson, Jeffery Carver, David Dampier, J. Edward Swan:
Show Me How You See: Lessons from Studying Computer Forensics Experts for Visualization.
80-86
Electronic Edition (link) BibTeX
- Xiaoyuan Suo, Ying Zhu, G. Scott Owen:
A Task Centered Framework for Computer Security Data Visualization.
87-94
Electronic Edition (link) BibTeX
- James Shearer, Kwan-Liu Ma, Toby Kohlenberg:
BGPeep: An IP-Space Centered View for Internet Routing Data.
95-110
Electronic Edition (link) BibTeX
- Fabian Fischer, Florian Mansmann, Daniel A. Keim, Stephan Pietzko, Marcel Waldvogel:
Large-Scale Network Monitoring for Visual Analysis of Attacks.
111-118
Electronic Edition (link) BibTeX
- Ryan Blue, Cody Dunne, Adam Fuchs, Kyle King, Aaron Schulman:
Visualizing Real-Time Network Resource Usage.
119-135
Electronic Edition (link) BibTeX
- Kenneth Prole, John R. Goodall, Anita D. D'Amico, Jason K. Kopylec:
Wireless Cyber Assets Discovery Visualization.
136-143
Electronic Edition (link) BibTeX
- Pavel Minarík, Tomás Dymácek:
NetFlow Data Visualization Based on Graphs.
144-151
Electronic Edition (link) BibTeX
- Sergey Bratus, Axel Hansen, Fabio Pellacini, Anna Shubina:
Backhoe, a Packet Trace and Log Browser.
152-160
Electronic Edition (link) BibTeX
- Jeff Janies:
Existence Plots: A Low-Resolution Time Series for Port Behavior Analysis.
161-168
Electronic Edition (link) BibTeX
- Shahrulniza Musa, David J. Parish:
Using Time Series 3D AlertGraph and False Alert Classification to Analyse Snort Alerts.
169-180
Electronic Edition (link) BibTeX
- Grant Vandenberghe:
Network Traffic Exploration Application: A Tool to Assess, Visualize, and Analyze Network Security Events.
181-196
Electronic Edition (link) BibTeX
Copyright © Sat May 16 23:44:46 2009
by Michael Ley (ley@uni-trier.de)