


default search action
VizSEC 2008: Cambridge, MA, USA
- John R. Goodall, Gregory J. Conti, Kwan-Liu Ma:
5th International Workshop on Visualization for Computer Security, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings. Lecture Notes in Computer Science 5210, Springer 2008, ISBN 978-3-540-85931-4 - Gregory J. Conti, Erik Dean, Matthew Sinda, Benjamin Sangster:
Visual Reverse Engineering of Binary and Data Files. 1-17 - Alexander Heitzmann, Bernardo Palazzi, Charalampos Papamanthou, Roberto Tamassia:
Effective Visualization of File System Access-Control. 18-25 - Ying H. Xia, Kevin D. Fairbanks
, Henry L. Owen:
Visual Analysis of Program Flow Data with Data Propagation. 26-35 - Moses Schwartz, Lorie M. Liebrock:
A Term Distribution Visualization Approach to Digital Forensic String Search. 36-43 - Leevar Williams, Richard Lippmann, Kyle Ingols:
GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool. 44-59 - Scott O'Hare, Steven Noel, Kenneth Prole:
A Graph-Theoretic Visualization Approach to Network Risk Analysis. 60-67 - John Homer, Ashok Varikuti, Xinming Ou, Miles A. McQueen:
Improving Attack Graph Visualization through Data Reduction and Attack Grouping. 68-79 - T. J. Jankun-Kelly, Josh Franck, David Wilson, Jeffrey C. Carver, David A. Dampier, J. Edward Swan II:
Show Me How You See: Lessons from Studying Computer Forensics Experts for Visualization. 80-86 - Xiaoyuan Suo, Ying Zhu
, G. Scott Owen:
A Task Centered Framework for Computer Security Data Visualization. 87-94 - James Shearer, Kwan-Liu Ma, Toby Kohlenberg:
BGPeep: An IP-Space Centered View for Internet Routing Data. 95-110 - Fabian Fischer, Florian Mansmann, Daniel A. Keim, Stephan Pietzko, Marcel Waldvogel
:
Large-Scale Network Monitoring for Visual Analysis of Attacks. 111-118 - Ryan Blue, Cody Dunne
, Adam Fuchs, Kyle King, Aaron Schulman:
Visualizing Real-Time Network Resource Usage. 119-135 - Kenneth Prole, John R. Goodall, Anita D. D'Amico, Jason K. Kopylec:
Wireless Cyber Assets Discovery Visualization. 136-143 - Pavel Minarík, Tomás Dymácek:
NetFlow Data Visualization Based on Graphs. 144-151 - Sergey Bratus, Axel Hansen, Fabio Pellacini, Anna Shubina:
Backhoe, a Packet Trace and Log Browser. 152-160 - Jeff Janies:
Existence Plots: A Low-Resolution Time Series for Port Behavior Analysis. 161-168 - Shahrulniza Musa
, David J. Parish:
Using Time Series 3D AlertGraph and False Alert Classification to Analyse Snort Alerts. 169-180 - Grant Vandenberghe:
Network Traffic Exploration Application: A Tool to Assess, Visualize, and Analyze Network Security Events. 181-196

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.