default search action
VizSEC 2009: Atlantic City, New Jersey, USA
- Deborah A. Frincke, Carrie Gates, John R. Goodall, Robert F. Erbacher:
6th International Workshop on Visualization for Cyber Security, VizSec 2009, Atlantic City, NJ, USA, October 11, 2009. IEEE Computer Society 2009
Keynote
- Bill Cheswick:
Visual tools for security: Is there a there there?
Network Visualization
- Anatoly Yelizarov, Dennis Gamayunov:
Visualization of complex attacks and state of attacked network. 1-9 - Joel Glanfield, Stephen Brooks, Teryl Taylor, Diana Paterson, Christopher Smith, Carrie Gates, John McHugh:
Over flow: An overview visualization for network analysis. 11-19 - David Barrera, Paul C. van Oorschot:
Security visualization tools and IPv6 addresses. 21-26
Malware and Forensics
- Daniel Quist, Lorie M. Liebrock:
Visualizing compiled executables for malware analysis. 27-32 - Philipp Trinius, Thorsten Holz, Jan Göbel, Felix C. Freiling:
Visual analysis of malware behavior using treemaps and thread graphs. 33-38 - T. J. Jankun-Kelly, David Wilson, Andrew S. Stamps, Josh Franck, Jeffrey C. Carver, J. Edward Swan II:
A visual analytic framework for exploring relationships in textual contents of digital forensics evidence. 39-44
Users and Usability
- Glenn A. Fink, Christopher L. North, Alex Endert, Stuart Rose:
Visualizing cyber security: Usable workspaces. 45-56 - John R. Goodall:
Visualization is better! A comparative evaluation. 57-68
Security Practices
- Dino Schweitzer, Jeff Boleng, Colin Hughes, Louis Murphy:
Visualizing keyboard pattern passwords. 69-73 - Shaun P. Morrissey, Georges G. Grinstein:
Visualizing firewall configurations using created voids. 75-79
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.