default search action
VizSEC 2005: Minneapolis, MN, USA
- Kwan-Liu Ma, Stephen C. North, William Yurcik:
2nd IEEE Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005. IEEE Computer Society 2005, ISBN 0-7803-9477-1
Cover
- Title Page.
- Copyright.
Introduction
- Preface.
- Committees.
Session 1
- Kulsoom Abdullah, Christopher P. Lee, Gregory J. Conti, John A. Copeland, John T. Stasko:
IDS RainStorm: Visualizing IDS Alarms. 1 - Glenn A. Fink, Paul Muessig, Chris North:
Visual Correlation of Host Processes and Network Traffic. 2 - Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, John R. Goodall, Amit Joshi:
A User-centered Look at Glyph-based Security Visualization. 3 - Chris Muelder, Kwan-Liu Ma, Tony Bartoletti:
A Visualization Methodology for Characterization of Network Scans. 4
Session 2
- Pin Ren, Yan Gao, Zhichun Li, Yan Chen, Benjamin Watson:
IDGraphs: Intrusion Detection and Analysis Using Histographs. 5 - John R. Goodall, Wayne G. Lutters, Penny Rheingans, Anita Komlodi:
Preserving the Big Picture: Visual Network Traffic Analysis with TN. 6 - Glenn A. Fink, Chris North:
Root Polar Layout of Internet Address Data for Security Administration. 7 - Danfeng Yao, Michael Shin, Roberto Tamassia, William H. Winsborough:
Visualization of Automated Trust Negotiation. 8
Session 3
- Kiran Lakkaraju, Ratna Bearavolu, Adam J. Slagell, William Yurcik, Stephen C. North:
Closing-the-Loop in NVisionIP: Integrating Discovery and Search in Security Visualizations. 9 - Gregory J. Conti, Julian B. Grizzard, Mustaque Ahamad, Henry L. Owen:
Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries. 10 - Hideki Koike, Kazuhiro Ohno, Kanba Koizumi:
Visualizing Cyber Attacks using IP Matrix. 11 - Steven Noel, Michael Jacobs, Pramod Kalapa, Sushil Jajodia:
Multiple Coordinated Views for Network Attack Graphs. 12
Session 4
- Anita D'Amico, Michael Kocka:
Information Assurance Visualizations for Specific Stages of Situational Awareness and Intended Uses: Lessons Learned. 13 - Adam Oline, Dirk Reiners:
Exploring Three-dimensional Visualization for Intrusion Detection. 14 - Robert F. Erbacher, Kim Christensen, Amanda Sundberg:
Designing Visualization Capabilities for IDS Challenges. 15 - Christopher P. Lee, Jason Trost, Nicholas Gibbs, Raheem A. Beyah, John A. Copeland:
Visual Firewall: Real-time Network Security Monito. 16
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.