VizSEC 2006 - 3rd Workshop on Visualization for Computer Security

Publisher
ACM Press
Website
Year
2006
Period
3 November
Place
Alexandria, Virginia, USA
ISBN
1-59593-549-5
Series
VizSec - IEEE Workshop on Visualization for Computer Security
DOI
Volume
Copyright info

Description

Networked computers are increasingly ubiquitous, and they are subject to attack, misuse, and abuse. Every effort is being made by organizations and individuals to build and maintain trustworthy computing systems. Traditional, signature-based and statistical methods are limited in their capability to cope with the large, evolving data and the dynamic nature of Internet. In many applications, visualization proves very effective to understand large high-dimensional data. Thus, there is a growing interest in the development of visualization methods as alternative or complementary solutions to the pressing cyber security problems.

All years

Articles

Mathew, Sunu, Giomundo, Richard, Upadhyaya, Shambhu J., Sudit, Moises, Stotz, Adam (2006): Understanding multistage attacks by attack-track based visualization of heterogeneous even. In: Yurcik, William, Axelsson, Stefan, Lakkaraju, Kiran, Teoh, Soon Tee (eds.) VizSEC 2006 - 3rd Workshop on Visualization for Computer Security 3 November, 2006, Alexandria, Virginia, USA. pp. 1-6. https://doi.acm.org/10.1145/1179576.1179578

Lee, Christopher P., Copeland, John A. (2006): Flowtag: a collaborative attack-analysis, reporting, and sharing tool for security researc. In: Yurcik, William, Axelsson, Stefan, Lakkaraju, Kiran, Teoh, Soon Tee (eds.) VizSEC 2006 - 3rd Workshop on Visualization for Computer Security 3 November, 2006, Alexandria, Virginia, USA. pp. 103-108. https://doi.acm.org/10.1145/1179576.1179597

Stephano, Amanda L., Groth, Dennis P. (2006): USEable security: interface design strategies for improving security. In: Yurcik, William, Axelsson, Stefan, Lakkaraju, Kiran, Teoh, Soon Tee (eds.) VizSEC 2006 - 3rd Workshop on Visualization for Computer Security 3 November, 2006, Alexandria, Virginia, USA. pp. 109-116. https://doi.acm.org/10.1145/1179576.1179598

Yee, George (2006): Visualization for privacy compliance. In: Yurcik, William, Axelsson, Stefan, Lakkaraju, Kiran, Teoh, Soon Tee (eds.) VizSEC 2006 - 3rd Workshop on Visualization for Computer Security 3 November, 2006, Alexandria, Virginia, USA. pp. 117-122. https://doi.acm.org/10.1145/1179576.1179599

Malécot, Erwan Le, Kohara, Masayoshi, Hori, Yoshiaki, Sakurai, Kouichi (2006): Interactively combining 2D and 3D visualization for network traffic monitoring. In: Yurcik, William, Axelsson, Stefan, Lakkaraju, Kiran, Teoh, Soon Tee (eds.) VizSEC 2006 - 3rd Workshop on Visualization for Computer Security 3 November, 2006, Alexandria, Virginia, USA. pp. 123-127. https://doi.acm.org/10.1145/1179576.1179600

Shabtai, Asaf, Klimov, Denis, Shahar, Yuval, Elovici, Yuval (2006): An intelligent, interactive tool for exploration and visualization of time-oriented securi. In: Yurcik, William, Axelsson, Stefan, Lakkaraju, Kiran, Teoh, Soon Tee (eds.) VizSEC 2006 - 3rd Workshop on Visualization for Computer Security 3 November, 2006, Alexandria, Virginia, USA. pp. 15-22. https://doi.acm.org/10.1145/1179576.1179580

Ren, Pin, Kristoff, John, Gooch, Bruce (2006): Visualizing DNS traffic. In: Yurcik, William, Axelsson, Stefan, Lakkaraju, Kiran, Teoh, Soon Tee (eds.) VizSEC 2006 - 3rd Workshop on Visualization for Computer Security 3 November, 2006, Alexandria, Virginia, USA. pp. 23-30. https://doi.acm.org/10.1145/1179576.1179582

Harrop, Warren, Armitage, Grenville J. (2006): Real-time collaborative network monitoring and control using 3D game engines for represent. In: Yurcik, William, Axelsson, Stefan, Lakkaraju, Kiran, Teoh, Soon Tee (eds.) VizSEC 2006 - 3rd Workshop on Visualization for Computer Security 3 November, 2006, Alexandria, Virginia, USA. pp. 31-40. https://doi.acm.org/10.1145/1179576.1179583

Wright, Charles V., Monrose, Fabian, Masson, Gerald M. (2006): Using visual motifs to classify encrypted traffic. In: Yurcik, William, Axelsson, Stefan, Lakkaraju, Kiran, Teoh, Soon Tee (eds.) VizSEC 2006 - 3rd Workshop on Visualization for Computer Security 3 November, 2006, Alexandria, Virginia, USA. pp. 41-50. https://doi.acm.org/10.1145/1179576.1179584

Wang, Weichao, Lu, Aidong (2006): Visualization assisted detection of sybil attacks in wireless networks. In: Yurcik, William, Axelsson, Stefan, Lakkaraju, Kiran, Teoh, Soon Tee (eds.) VizSEC 2006 - 3rd Workshop on Visualization for Computer Security 3 November, 2006, Alexandria, Virginia, USA. pp. 51-60. https://doi.acm.org/10.1145/1179576.1179585

Abdullah, Kulsoom, Copeland, John A. (2006): Tool update: high alarm count issues in IDS rainstorm. In: Yurcik, William, Axelsson, Stefan, Lakkaraju, Kiran, Teoh, Soon Tee (eds.) VizSEC 2006 - 3rd Workshop on Visualization for Computer Security 3 November, 2006, Alexandria, Virginia, USA. pp. 61-62. https://doi.acm.org/10.1145/1179576.1179587

Yurcik, William (2006): Tool update: visflowconnect-IP with advanced filtering from usability testing. In: Yurcik, William, Axelsson, Stefan, Lakkaraju, Kiran, Teoh, Soon Tee (eds.) VizSEC 2006 - 3rd Workshop on Visualization for Computer Security 3 November, 2006, Alexandria, Virginia, USA. pp. 63-64. https://doi.acm.org/10.1145/1179576.1179588

Yurcik, William (2006): Tool update: NVisionIP improvements (difference view, sparklines, and shapes). In: Yurcik, William, Axelsson, Stefan, Lakkaraju, Kiran, Teoh, Soon Tee (eds.) VizSEC 2006 - 3rd Workshop on Visualization for Computer Security 3 November, 2006, Alexandria, Virginia, USA. pp. 65-66. https://doi.acm.org/10.1145/1179576.1179589

Ren, Pin (2006): Ensuring the continuing success of vizsec. In: Yurcik, William, Axelsson, Stefan, Lakkaraju, Kiran, Teoh, Soon Tee (eds.) VizSEC 2006 - 3rd Workshop on Visualization for Computer Security 3 November, 2006, Alexandria, Virginia, USA. pp. 67-70. https://doi.acm.org/10.1145/1179576.1179591

Li, L., Liu, P., Kesidis, George (2006): Visual toolkit for network security experiment specification and data analysis. In: Yurcik, William, Axelsson, Stefan, Lakkaraju, Kiran, Teoh, Soon Tee (eds.) VizSEC 2006 - 3rd Workshop on Visualization for Computer Security 3 November, 2006, Alexandria, Virginia, USA. pp. 7-14. https://doi.acm.org/10.1145/1179576.1179579

Oberheide, Jon, Karir, Manish, Blazakis, Dionysus (2006): VAST: visualizing autonomous system topology. In: Yurcik, William, Axelsson, Stefan, Lakkaraju, Kiran, Teoh, Soon Tee (eds.) VizSEC 2006 - 3rd Workshop on Visualization for Computer Security 3 November, 2006, Alexandria, Virginia, USA. pp. 71-80. https://doi.acm.org/10.1145/1179576.1179592

Teoh, Soon Tee, Ranjan, Supranamaya, Nucci, Antonio, Chuah, Chen-Nee (2006): BGP eye: a new visualization tool for real-time detection and analysis of BGP anomalies. In: Yurcik, William, Axelsson, Stefan, Lakkaraju, Kiran, Teoh, Soon Tee (eds.) VizSEC 2006 - 3rd Workshop on Visualization for Computer Security 3 November, 2006, Alexandria, Virginia, USA. pp. 81-90. https://doi.acm.org/10.1145/1179576.1179593

Schweitzer, Dino, III, Leemon C. Baird (2006): Discovering an RC4 anomaly through visualization. In: Yurcik, William, Axelsson, Stefan, Lakkaraju, Kiran, Teoh, Soon Tee (eds.) VizSEC 2006 - 3rd Workshop on Visualization for Computer Security 3 November, 2006, Alexandria, Virginia, USA. pp. 91-94. https://doi.acm.org/10.1145/1179576.1179595

Hertzog, Patrick (2006): Visualizations to improve reactivity towards security incidents inside corporate networks. In: Yurcik, William, Axelsson, Stefan, Lakkaraju, Kiran, Teoh, Soon Tee (eds.) VizSEC 2006 - 3rd Workshop on Visualization for Computer Security 3 November, 2006, Alexandria, Virginia, USA. pp. 95-102. https://doi.acm.org/10.1145/1179576.1179596