


default search action
VizSEC 2008: Cambridge, MA, USA
- John R. Goodall, Gregory J. Conti, Kwan-Liu Ma:

5th International Workshop on Visualization for Computer Security, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings. Lecture Notes in Computer Science 5210, Springer 2008, ISBN 978-3-540-85931-4 - Gregory J. Conti, Erik Dean, Matthew Sinda, Benjamin Sangster:

Visual Reverse Engineering of Binary and Data Files. 1-17 - Alexander Heitzmann, Bernardo Palazzi, Charalampos Papamanthou, Roberto Tamassia:

Effective Visualization of File System Access-Control. 18-25 - Ying H. Xia, Kevin D. Fairbanks

, Henry L. Owen:
Visual Analysis of Program Flow Data with Data Propagation. 26-35 - Moses Schwartz, Lorie M. Liebrock:

A Term Distribution Visualization Approach to Digital Forensic String Search. 36-43 - Leevar Williams, Richard Lippmann, Kyle Ingols:

GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool. 44-59 - Scott O'Hare, Steven Noel, Kenneth Prole:

A Graph-Theoretic Visualization Approach to Network Risk Analysis. 60-67 - John Homer, Ashok Varikuti, Xinming Ou, Miles A. McQueen:

Improving Attack Graph Visualization through Data Reduction and Attack Grouping. 68-79 - T. J. Jankun-Kelly, Josh Franck, David Wilson, Jeffrey C. Carver, David A. Dampier, J. Edward Swan II:

Show Me How You See: Lessons from Studying Computer Forensics Experts for Visualization. 80-86 - Xiaoyuan Suo, Ying Zhu

, G. Scott Owen:
A Task Centered Framework for Computer Security Data Visualization. 87-94 - James Shearer, Kwan-Liu Ma, Toby Kohlenberg:

BGPeep: An IP-Space Centered View for Internet Routing Data. 95-110 - Fabian Fischer, Florian Mansmann, Daniel A. Keim, Stephan Pietzko, Marcel Waldvogel

:
Large-Scale Network Monitoring for Visual Analysis of Attacks. 111-118 - Ryan Blue, Cody Dunne

, Adam Fuchs, Kyle King, Aaron Schulman:
Visualizing Real-Time Network Resource Usage. 119-135 - Kenneth Prole, John R. Goodall, Anita D. D'Amico, Jason K. Kopylec:

Wireless Cyber Assets Discovery Visualization. 136-143 - Pavel Minarík, Tomás Dymácek:

NetFlow Data Visualization Based on Graphs. 144-151 - Sergey Bratus, Axel Hansen, Fabio Pellacini, Anna Shubina:

Backhoe, a Packet Trace and Log Browser. 152-160 - Jeff Janies:

Existence Plots: A Low-Resolution Time Series for Port Behavior Analysis. 161-168 - Shahrulniza Musa

, David J. Parish:
Using Time Series 3D AlertGraph and False Alert Classification to Analyse Snort Alerts. 169-180 - Grant Vandenberghe:

Network Traffic Exploration Application: A Tool to Assess, Visualize, and Analyze Network Security Events. 181-196

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














