


default search action
VizSEC 2018: Berlin, Germany
- Diane Staheli, Celeste Lyn Paul, Jörn Kohlhammer, Daniel M. Best, Stoney Trent, Nicolas Prigent, Robert Gove, Graig Sauer:
15th IEEE Symposium on Visualization for Cyber Security, VizSec 2018, Berlin, Germany, October 22, 2018. IEEE 2018, ISBN 978-1-5386-8194-7 - Robert Gove
, Lauren Deason:
Visualizing Automatically Detected Periodic Network Activity. 1-8 - Jia-Kai Chou, Chris Bryan, Jing Li, Kwan-Liu Ma:
An Empirical Study on Perceptually Masking Privacy in Graph Visualizations. 1-8 - Alex Ulmer, Marija Schufrin, David Sessler, Jörn Kohlhammer:
Visual-Interactive Identification of Anomalous IP-Block Behavior Using Geo-IP Data. 1-8 - Georgios Bakirtzis
, Brandon J. Simon, Cody H. Fleming, Carl R. Elks:
Looking for a Black Cat in a Dark Room: Security Visualization for Cyber-Physical System Design and Analysis. 1-8 - Marco Angelini
, Graziano Blasilli
, Pietro Borrello
, Emilio Coppa
, Daniele Cono D'Elia
, Serena Ferracci, Simone Lenti
, Giuseppe Santucci:
ROPMate: Visually Assisting the Creation of ROP-based Exploits. 1-8 - Eric Krokos, Alexander Rowden
, Kirsten Whitley
, Amitabh Varshney
:
Visual Analytics for Root DNS Data. 1-8 - Dustin Lockhart Arendt, Lyndsey R. Franklin
, Fumeng Yang, Brooke R. Brisbois, Ryan R. LaMothe:
Crush Your Data with ViC2ES Then CHISSL Away. 1-8 - Siming Chen, Shuai Chen
, Natalia V. Andrienko, Gennady L. Andrienko, Phong H. Nguyen, Cagatay Turkay, Olivier Thonnard, Xiaoru Yuan:
User Behavior Map: Visual Exploration for Cyber Security Session Data. 1-4 - Bram C. M. Cappers, Paulus N. Meessen
, Sandro Etalle, Jarke J. van Wijk:
Eventpad: Rapid Malware Analysis and Reverse Engineering using Visual Analytics. 1-8 - Awalin Sopan, Matthew Berninger, Murali Mulakaluri, Raj Katakam:
Building a Machine Learning Model for the SOC, by the Input from the SOC, and Analyzing it for the SOC. 1-8 - Yifan Yang, John P. Collomosse, Arthi Kanchana Manohar, Jo Briggs
, Jamie Steane
:
TAPESTRY: Visualizing Interwoven Identities for Trust Provenance. 1-4

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.