default search action
VizSEC@CCS 2006: Alexandria, VA, USA
- William Yurcik, Stefan Axelsson, Kiran Lakkaraju, Soon Tee Teoh:
3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006. ACM 2006, ISBN 1-59593-549-5
Tool papers
- Sunu Mathew, Richard Giomundo, Shambhu J. Upadhyaya, Moises Sudit, Adam Stotz:
Understanding multistage attacks by attack-track based visualization of heterogeneous event streams. 1-6 - Lunquan Li, Peng Liu, George Kesidis:
Visual toolkit for network security experiment specification and data analysis. 7-14 - Asaf Shabtai, Denis Klimov, Yuval Shahar, Yuval Elovici:
An intelligent, interactive tool for exploration and visualization of time-oriented security data. 15-22
Long papers
- Pin Ren, John Kristoff, Bruce Gooch:
Visualizing DNS traffic. 23-30 - Warren Harrop, Grenville J. Armitage:
Real-time collaborative network monitoring and control using 3D game engines for representation and interaction. 31-40 - Charles V. Wright, Fabian Monrose, Gerald M. Masson:
Using visual motifs to classify encrypted traffic. 41-50 - Weichao Wang, Aidong Lu:
Visualization assisted detection of sybil attacks in wireless networks. 51-60
Tool update demonstrations over lunch
- Kulsoom Abdullah, John A. Copeland:
Tool update: high alarm count issues in IDS rainstorm. 61-62 - William Yurcik:
Tool update: visflowconnect-IP with advanced filtering from usability testing. 63-64 - William Yurcik:
Tool update: NVisionIP improvements (difference view, sparklines, and shapes). 65-66
VizSEC and VizBGP
- Pin Ren:
Ensuring the continuing success of vizsec. 67-70 - Jon Oberheide, Manish Karir, Dionysus Blazakis:
VAST: visualizing autonomous system topology. 71-80 - Soon Tee Teoh, Supranamaya Ranjan, Antonio Nucci, Chen-Nee Chuah:
BGP eye: a new visualization tool for real-time detection and analysis of BGP anomalies. 81-90
Short presentations
- Dino Schweitzer, Leemon C. Baird III:
Discovering an RC4 anomaly through visualization. 91-94 - Patrick Hertzog:
Visualizations to improve reactivity towards security incidents inside corporate networks. 95-102 - Christopher P. Lee, John A. Copeland:
Flowtag: a collaborative attack-analysis, reporting, and sharing tool for security researchers. 103-108 - Amanda L. Stephano, Dennis P. Groth:
USEable security: interface design strategies for improving security. 109-116 - George Yee:
Visualization for privacy compliance. 117-122 - Erwan Le Malécot, Masayoshi Kohara, Yoshiaki Hori, Kouichi Sakurai:
Interactively combining 2D and 3D visualization for network traffic monitoring. 123-127
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.