default search action
1st VizSEC/DMSEC@CCS 2004: Washington, DC, USA
- Carla E. Brodley, Philip Chan, Richard Lippmann, William Yurcik:
1st ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004. ACM 2004, ISBN 1-58113-974-8
DMSEC session
- Maja Pusara, Carla E. Brodley:
User re-authentication via mouse movements. 1-8 - Charles V. Wright, Fabian Monrose, Gerald M. Masson:
HMM profiles for network traffic classification. 9-15 - Gaurav Tandon, Philip K. Chan, Debasis Mitra:
MORPHEUS: motif oriented representations to purge hostile events from unlabeled sequences. 16-25
VizSEC link analysis session
- Xiaoxin Yin, William Yurcik, Michael Treaster, Yifan Li, Kiran Lakkaraju:
VisFlowConnect: netflow visualizations of link relationships for security situational awareness. 26-34 - Soon Tee Teoh, Ke Zhang, Shih-Ming Tseng, Kwan-Liu Ma, Shyhtsun Felix Wu:
Combining visual and automated data mining for near-real-time anomaly detection and analysis in BGP. 35-44 - Gregory J. Conti, Kulsoom Abdullah:
Passive visual fingerprinting of network attack tools. 45-54 - Robert Ball, Glenn A. Fink, Chris North:
Home-centric visualization of network traffic for security administration. 55-64
VizSEC state analysis session
- Kiran Lakkaraju, William Yurcik, Adam J. Lee:
NVisionIP: netflow visualizations of system state for security situational awareness. 65-72 - Jonathan McPherson, Kwan-Liu Ma, Paul Krystosk, Tony Bartoletti, Marvin Christensen:
PortVis: a tool for port-based detection of security events. 73-81
VizSEC innovative visualizations session
- InSeon Yoo:
Visualizing windows executable viruses using self-organizing maps. 82-89 - Christos Papadopoulos, Chris Kyriakakis, Alexander A. Sawchuk, Xinming He:
CyberSeer: 3D audio-visual immersion for network security and management. 90-98 - Stefan Axelsson:
Combining a bayesian classifier with visualisation: understanding the IDS. 99-108 - Steven Noel, Sushil Jajodia:
Managing attack graph complexity through visual hierarchical aggregation. 109-118
VizSEC short papers session
- Thomas Goldring:
Scatter (and other) plots for visualizing user profiling data and network traffic. 119-123 - Alfonso Valdes, Martin W. Fong:
Scalable visualization of propagating internet phenomena. 124-127 - Wei-Jen Li, Shlomo Hershkop, Salvatore J. Stolfo:
Email archive analysis through graphical visualization. 128-132 - William Yurcik, Xin Meng, Nadir Kiyanclar:
NVisionCC: a visualization framework for high performance cluster security. 133-137 - Jeffrey B. Colombe, Greg Stephens:
Statistical profiling and visualization for detection of malicious insider attacks on computer networks. 138-142 - Hideki Koike, Kazuhiro Ohno:
SnortView: visualization system of snort logs. 143-147
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.