VizSEC C

20 papers

YearTitle / Authors
20041st ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004
Carla E. Brodley, Philip Chan, Richard Lippmann, William Yurcik
2004Combining a bayesian classifier with visualisation: understanding the IDS.
Stefan Axelsson
2004Combining visual and automated data mining for near-real-time anomaly detection and analysis in BGP.
Soon Tee Teoh, Ke Zhang, Shih-Ming Tseng, Kwan-Liu Ma, Shyhtsun Felix Wu
2004CyberSeer: 3D audio-visual immersion for network security and management.
Christos Papadopoulos, Chris Kyriakakis, Alexander A. Sawchuk, Xinming He
2004Email archive analysis through graphical visualization.
Wei-Jen Li, Shlomo Hershkop, Salvatore J. Stolfo
2004HMM profiles for network traffic classification.
Charles V. Wright, Fabian Monrose, Gerald M. Masson
2004Home-centric visualization of network traffic for security administration.
Robert Ball, Glenn A. Fink, Chris North
2004MORPHEUS: motif oriented representations to purge hostile events from unlabeled sequences.
Gaurav Tandon, Philip K. Chan, Debasis Mitra
2004Managing attack graph complexity through visual hierarchical aggregation.
Steven Noel, Sushil Jajodia
2004NVisionCC: a visualization framework for high performance cluster security.
William Yurcik, Xin Meng, Nadir Kiyanclar
2004NVisionIP: netflow visualizations of system state for security situational awareness.
Kiran Lakkaraju, William Yurcik, Adam J. Lee
2004Passive visual fingerprinting of network attack tools.
Gregory J. Conti, Kulsoom Abdullah
2004PortVis: a tool for port-based detection of security events.
Jonathan McPherson, Kwan-Liu Ma, Paul Krystosk, Tony Bartoletti, Marvin Christensen
2004Scalable visualization of propagating internet phenomena.
Alfonso Valdes, Martin W. Fong
2004Scatter (and other) plots for visualizing user profiling data and network traffic.
Thomas Goldring
2004SnortView: visualization system of snort logs.
Hideki Koike, Kazuhiro Ohno
2004Statistical profiling and visualization for detection of malicious insider attacks on computer networks.
Jeffrey B. Colombe, Greg Stephens
2004User re-authentication via mouse movements.
Maja Pusara, Carla E. Brodley
2004VisFlowConnect: netflow visualizations of link relationships for security situational awareness.
Xiaoxin Yin, William Yurcik, Michael Treaster, Yifan Li, Kiran Lakkaraju
2004Visualizing windows executable viruses using self-organizing maps.
InSeon Yoo