


default search action
VizSEC@CCS 2006: Alexandria, VA, USA
- William Yurcik, Stefan Axelsson, Kiran Lakkaraju, Soon Tee Teoh:

3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006. ACM 2006, ISBN 1-59593-549-5
Tool papers
- Sunu Mathew, Richard Giomundo, Shambhu J. Upadhyaya, Moises Sudit, Adam Stotz:

Understanding multistage attacks by attack-track based visualization of heterogeneous event streams. 1-6 - Lunquan Li, Peng Liu, George Kesidis:

Visual toolkit for network security experiment specification and data analysis. 7-14 - Asaf Shabtai, Denis Klimov, Yuval Shahar

, Yuval Elovici:
An intelligent, interactive tool for exploration and visualization of time-oriented security data. 15-22
Long papers
- Pin Ren, John Kristoff

, Bruce Gooch:
Visualizing DNS traffic. 23-30 - Warren Harrop, Grenville J. Armitage:

Real-time collaborative network monitoring and control using 3D game engines for representation and interaction. 31-40 - Charles V. Wright, Fabian Monrose, Gerald M. Masson:

Using visual motifs to classify encrypted traffic. 41-50 - Weichao Wang, Aidong Lu:

Visualization assisted detection of sybil attacks in wireless networks. 51-60
Tool update demonstrations over lunch
- Kulsoom Abdullah, John A. Copeland:

Tool update: high alarm count issues in IDS rainstorm. 61-62 - William Yurcik:

Tool update: visflowconnect-IP with advanced filtering from usability testing. 63-64 - William Yurcik:

Tool update: NVisionIP improvements (difference view, sparklines, and shapes). 65-66
VizSEC and VizBGP
- Pin Ren:

Ensuring the continuing success of vizsec. 67-70 - Jon Oberheide, Manish Karir, Dionysus Blazakis:

VAST: visualizing autonomous system topology. 71-80 - Soon Tee Teoh, Supranamaya Ranjan, Antonio Nucci, Chen-Nee Chuah

:
BGP eye: a new visualization tool for real-time detection and analysis of BGP anomalies. 81-90
Short presentations
- Dino Schweitzer, Leemon C. Baird III:

Discovering an RC4 anomaly through visualization. 91-94 - Patrick Hertzog:

Visualizations to improve reactivity towards security incidents inside corporate networks. 95-102 - Christopher P. Lee, John A. Copeland:

Flowtag: a collaborative attack-analysis, reporting, and sharing tool for security researchers. 103-108 - Amanda L. Stephano, Dennis P. Groth:

USEable security: interface design strategies for improving security. 109-116 - George Yee:

Visualization for privacy compliance. 117-122 - Erwan Le Malécot, Masayoshi Kohara, Yoshiaki Hori, Kouichi Sakurai:

Interactively combining 2D and 3D visualization for network traffic monitoring. 123-127

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














