VizSEC 2005 - IEEE Workshop on Visualization for Computer Security

Publisher
IEEE Computer Society
Website
Year
2005
Period
26 October
Place
Minneapolis, MN, USA
ISBN
0-7803-9477-1
Series
VizSec - IEEE Workshop on Visualization for Computer Security
DOI
Volume
Copyright info

Description

Networked computers are increasingly ubiquitous, and they are subject to attack, misuse, and abuse. Every effort is being made by organizations and individuals to build and maintain trustworthy computing systems. Traditional, signature-based and statistical methods are limited in their capability to cope with the large, evolving data and the dynamic nature of Internet. In many applications, visualization proves very effective to understand large high-dimensional data. Thus, there is a growing interest in the development of visualization methods as alternative or complementary solutions to the pressing cyber security problems.

All years

Articles

(2005): Title Page. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.12

(2005): Copyright. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.9

(2005): Preface. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.16

(2005): Committees. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.4

Abdullah, Kulsoom, Lee, Christopher P., Conti, Gregory J., Copeland, John A., Stasko, John T. (2005): IDS RainStorm: Visualizing IDS Alarms. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 1. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.8

Fink, Glenn A., Muessig, Paul, North, Chris (2005): Visual Correlation of Host Processes and Network Traffic. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 2. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.18

Komlodi, Anita, Rheingans, Penny, Ayachit, Utkarsha, Goodall, John R., Joshi, Amit (2005): A User-centered Look at Glyph-based Security Visualization. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 3. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.1

Muelder, Chris, Ma, Kwan-Liu, Bartoletti, Tony (2005): A Visualization Methodology for Characterization of Network Scans. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 4. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.2

Ren, Pin, Gao, Yan, Li, Zhichun, Chen, Yan, Watson, Benjamin (2005): IDGraphs: Intrusion Detection and Analysis Using Histographs. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 5. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.7

Goodall, John R., Lutters, Wayne G., Rheingans, Penny, Komlodi, Anita (2005): Preserving the Big Picture: Visual Network Traffic Analysis with TN. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 6. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.17

Fink, Glenn A., North, Chris (2005): Root Polar Layout of Internet Address Data for Security Administration. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 7. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.23

Yao, Danfeng, Shin, Michael, Tamassia, Roberto, Winsborough, William H. (2005): Visualization of Automated Trust Negotiation. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 8. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.21

Lakkaraju, Kiran, Bearavolu, Ratna, Slagell, Adam J., Yurcik, William, North, Stephen C. (2005): Closing-the-Loop in NVisionIP: Integrating Discovery and Search in Security Visualizations. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 9. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.3

Conti, Gregory J., Grizzard, Julian B., Ahamad, Mustaque, Owen, Henry L. (2005): Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding . In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 10. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.19

Koike, Hideki, Ohno, Kazuhiro, Koizumi, Kanba (2005): Visualizing Cyber Attacks using IP Matrix. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 11. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.22

Noel, Steven, Jacobs, Michael, Kalapa, Pramod, Jajodia, Sushil (2005): Multiple Coordinated Views for Network Attack Graphs. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 12. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.14

D\'Amico, Anita, Kocka, Michael (2005): Information Assurance Visualizations for Specific Stages of Situational Awareness and Inte. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 13. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.13

Oline, Adam, Reiners, Dirk (2005): Exploring Three-dimensional Visualization for Intrusion Detection. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 14. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.6

Erbacher, Robert F., Christensen, Kim, Sundberg, Amanda (2005): Designing Visualization Capabilities for IDS Challenges. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 15. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.5

Lee, Christopher P., Trost, Jason, Gibbs, Nicholas, Beyah, Raheem A., Copeland, John A. (2005): Visual Firewall: Real-time Network Security Monito. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 16. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.20