VizSEC C

21 papers

YearTitle / Authors
20052nd IEEE Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005
Kwan-Liu Ma, Stephen C. North, William Yurcik
2005A User-centered Look at Glyph-based Security Visualization.
Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, John R. Goodall, Amit Joshi
2005A Visualization Methodology for Characterization of Network Scans.
Chris Muelder, Kwan-Liu Ma, Tony Bartoletti
2005Closing-the-Loop in NVisionIP: Integrating Discovery and Search in Security Visualizations.
Kiran Lakkaraju, Ratna Bearavolu, Adam J. Slagell, William Yurcik, Stephen C. North
2005Committees.
2005Copyright.
2005Designing Visualization Capabilities for IDS Challenges.
Robert F. Erbacher, Kim Christensen, Amanda Sundberg
2005Exploring Three-dimensional Visualization for Intrusion Detection.
Adam Oline, Dirk Reiners
2005IDGraphs: Intrusion Detection and Analysis Using Histographs.
Pin Ren, Yan Gao, Zhichun Li, Yan Chen, Benjamin Watson
2005IDS RainStorm: Visualizing IDS Alarms.
Kulsoom Abdullah, Christopher P. Lee, Gregory J. Conti, John A. Copeland, John T. Stasko
2005Information Assurance Visualizations for Specific Stages of Situational Awareness and Intended Uses: Lessons Learned.
Anita D'Amico, Michael Kocka
2005Multiple Coordinated Views for Network Attack Graphs.
Steven Noel, Michael Jacobs, Pramod Kalapa, Sushil Jajodia
2005Preface.
2005Preserving the Big Picture: Visual Network Traffic Analysis with TN.
John R. Goodall, Wayne G. Lutters, Penny Rheingans, Anita Komlodi
2005Root Polar Layout of Internet Address Data for Security Administration.
Glenn A. Fink, Chris North
2005Title Page.
2005Visual Correlation of Host Processes and Network Traffic.
Glenn A. Fink, Paul Muessig, Chris North
2005Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries.
Gregory J. Conti, Julian B. Grizzard, Mustaque Ahamad, Henry L. Owen
2005Visual Firewall: Real-time Network Security Monito.
Christopher P. Lee, Jason Trost, Nicholas Gibbs, Raheem A. Beyah, John A. Copeland
2005Visualization of Automated Trust Negotiation.
Danfeng Yao, Michael Shin, Roberto Tamassia, William H. Winsborough
2005Visualizing Cyber Attacks using IP Matrix.
Hideki Koike, Kazuhiro Ohno, Kanba Koizumi