VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security

Publisher
ACM Press
Website
Year
2004
Period
29 October
Place
Washington DC, USA
ISBN
1-58113-974-8
Series
VizSec - IEEE Workshop on Visualization for Computer Security
DOI
Volume
Copyright info

Description

Networked computers are increasingly ubiquitous, and they are subject to attack, misuse, and abuse. Every effort is being made by organizations and individuals to build and maintain trustworthy computing systems. Traditional, signature-based and statistical methods are limited in their capability to cope with the large, evolving data and the dynamic nature of Internet. In many applications, visualization proves very effective to understand large high-dimensional data. Thus, there is a growing interest in the development of visualization methods as alternative or complementary solutions to the pressing cyber security problems.

All years

Articles

Pusara, Maja, Brodley, Carla E. (2004): User re-authentication via mouse movements. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 1-8. https://doi.acm.org/10.1145/1029208.1029210

Noel, Steven, Jajodia, Sushil (2004): Managing attack graph complexity through visual hierarchical aggregation. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 109-118. https://doi.acm.org/10.1145/1029208.1029225

Goldring, Thomas (2004): Scatter (and other) plots for visualizing user profiling data and network traffic. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 119-123. https://doi.acm.org/10.1145/1029208.1029227

Valdes, Alfonso, Fong, Martin W. (2004): Scalable visualization of propagating internet phenomena. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 124-127. https://doi.acm.org/10.1145/1029208.1029228

Li, Wei-Jen, Hershkop, Shlomo, Stolfo, Salvatore J. (2004): Email archive analysis through graphical visualization. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 128-132. https://doi.acm.org/10.1145/1029208.1029229

Yurcik, William, Meng, Xin, Kiyanclar, Nadir (2004): NVisionCC: a visualization framework for high performance cluster security. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 133-137. https://doi.acm.org/10.1145/1029208.1029230

Colombe, Jeffrey B., Stephens, Gregory (2004): Statistical profiling and visualization for detection of malicious insider attacks on comp. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 138-142. https://doi.acm.org/10.1145/1029208.1029231

Koike, Hideki, Ohno, Kazuhiro (2004): SnortView: visualization system of snort logs. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 143-147. https://doi.acm.org/10.1145/1029208.1029232

Tandon, Gaurav, Chan, Philip K., Mitra, Debasis (2004): MORPHEUS: motif oriented representations to purge hostile events from unlabeled sequences. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 16-25. https://doi.acm.org/10.1145/1029208.1029212

Yin, Xiaoxin, Yurcik, William, Treaster, Michael, Li, Yifan, Lakkaraju, Kiran (2004): VisFlowConnect: netflow visualizations of link relationships for security situational awar. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 26-34. https://doi.acm.org/10.1145/1029208.1029214

Teoh, Soon Tee, Zhang, Ke, Tseng, Shih-Ming, Ma, Kwan-Liu, Wu, Shyhtsun Felix (2004): Combining visual and automated data mining for near-real-time anomaly detection and analys. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 35-44. https://doi.acm.org/10.1145/1029208.1029215

Conti, Gregory J., Abdullah, Kulsoom (2004): Passive visual fingerprinting of network attack tools. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 45-54. https://doi.acm.org/10.1145/1029208.1029216

Ball, Robert, Fink, Glenn A., North, Chris (2004): Home-centric visualization of network traffic for security administration. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 55-64. https://doi.acm.org/10.1145/1029208.1029217

Lakkaraju, Kiran, Yurcik, William, Lee, Adam J. (2004): NVisionIP: netflow visualizations of system state for security situational awareness. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 65-72. https://doi.acm.org/10.1145/1029208.1029219

McPherson, Jonathan, Ma, Kwan-Liu, Krystosk, Paul, Bartoletti, Tony, Christensen, Marvin (2004): PortVis: a tool for port-based detection of security events. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 73-81. https://doi.acm.org/10.1145/1029208.1029220

Yoo, InSeon (2004): Visualizing windows executable viruses using self-organizing maps. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 82-89. https://doi.acm.org/10.1145/1029208.1029222

Wright, Charles V., Monrose, Fabian, Masson, Gerald M. (2004): HMM profiles for network traffic classification. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 9-15. https://doi.acm.org/10.1145/1029208.1029211

Papadopoulos, Christos, Kyriakakis, Chris, Sawchuk, Alexander A., He, Xinming (2004): CyberSeer: 3D audio-visual immersion for network security and management. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 90-98. https://doi.acm.org/10.1145/1029208.1029223

Axelsson, Stefan (2004): Combining a bayesian classifier with visualisation: understanding the IDS. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 99-108. https://doi.acm.org/10.1145/1029208.1029224

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
315,380 designers enjoy our newsletter—sure you don’t want to receive it?

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
315,380 designers enjoy our newsletter—sure you don’t want to receive it?