


default search action
1st VizSEC/DMSEC@CCS 2004: Washington, DC, USA
- Carla E. Brodley, Philip Chan, Richard Lippmann, William Yurcik:

1st ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004. ACM 2004, ISBN 1-58113-974-8
DMSEC session
- Maja Pusara, Carla E. Brodley:

User re-authentication via mouse movements. 1-8 - Charles V. Wright, Fabian Monrose, Gerald M. Masson:

HMM profiles for network traffic classification. 9-15 - Gaurav Tandon, Philip K. Chan, Debasis Mitra:

MORPHEUS: motif oriented representations to purge hostile events from unlabeled sequences. 16-25
VizSEC link analysis session
- Xiaoxin Yin, William Yurcik, Michael Treaster, Yifan Li, Kiran Lakkaraju:

VisFlowConnect: netflow visualizations of link relationships for security situational awareness. 26-34 - Soon Tee Teoh, Ke Zhang, Shih-Ming Tseng, Kwan-Liu Ma, Shyhtsun Felix Wu:

Combining visual and automated data mining for near-real-time anomaly detection and analysis in BGP. 35-44 - Gregory J. Conti, Kulsoom Abdullah:

Passive visual fingerprinting of network attack tools. 45-54 - Robert Ball, Glenn A. Fink, Chris North:

Home-centric visualization of network traffic for security administration. 55-64
VizSEC state analysis session
- Kiran Lakkaraju, William Yurcik, Adam J. Lee

:
NVisionIP: netflow visualizations of system state for security situational awareness. 65-72 - Jonathan McPherson, Kwan-Liu Ma, Paul Krystosk, Tony Bartoletti, Marvin Christensen:

PortVis: a tool for port-based detection of security events. 73-81
VizSEC innovative visualizations session
- InSeon Yoo:

Visualizing windows executable viruses using self-organizing maps. 82-89 - Christos Papadopoulos, Chris Kyriakakis, Alexander A. Sawchuk, Xinming He:

CyberSeer: 3D audio-visual immersion for network security and management. 90-98 - Stefan Axelsson:

Combining a bayesian classifier with visualisation: understanding the IDS. 99-108 - Steven Noel, Sushil Jajodia:

Managing attack graph complexity through visual hierarchical aggregation. 109-118
VizSEC short papers session
- Thomas Goldring:

Scatter (and other) plots for visualizing user profiling data and network traffic. 119-123 - Alfonso Valdes, Martin W. Fong:

Scalable visualization of propagating internet phenomena. 124-127 - Wei-Jen Li, Shlomo Hershkop, Salvatore J. Stolfo:

Email archive analysis through graphical visualization. 128-132 - William Yurcik, Xin Meng, Nadir Kiyanclar:

NVisionCC: a visualization framework for high performance cluster security. 133-137 - Jeffrey B. Colombe, Greg Stephens:

Statistical profiling and visualization for detection of malicious insider attacks on computer networks. 138-142 - Hideki Koike, Kazuhiro Ohno:

SnortView: visualization system of snort logs. 143-147

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














