Visualization for Cyber Security Conference List of Papers
Whilst researching novel methods for visualising data from computer security systems the VizSec conference proceedings looked interesting. VizSec is short for Visualization for Cyber Security. This is an annual symposium dedicated to the use of visualisation techniques to help with the complexity of monitoring the large modern systems we all use. System security has become a big data problem and only efficient data analytics and visual analytics will help manage it.
All Papers from the Annual Visualization For Cyber Security Symposium
When first researching cyber-security data visualization the 11th International Symposium on Visualization for Cyber Security was about to take place (November 2014). At the time the papers from the previous 10 years of symposiums were available from different institutional or publisher web sites. It meant there was not a single search available to get one list of all the papers presented at VizSec over the years. Therefore visits to several web pages and web sites were required to put together the list of all previous VizSec Symposium papers. This article was written to address that issue. The full list of VizSec papers was given in this article, providing a service that saved others from having to do the same.
Since then another source of all the papers has been provided. The VizSec Proceedings Browser lists all the papers from all the VizSec Symposiums. A good a tool for promoting the work of visual analytics as applied to cyber-security. Even better is that links are provided to the paper's publishing site.
Visualisation or Visualization
A note on the spelling of visualisation and visualization. Both are valid forms. The version with the Z is common in the Americas, the version with the S is common with British speakers. Since this web site is based in the United Kingdom (UK) the latter is used in general text. The conference is organised from the United States hence the spelling of visualization in the conference title. It is worth noting that the use of visualization is more common than visualisation when Googling (searching the Internet).
List of Papers in the Proceedings of the Annual International Symposium on Visualization for Cyber Security
VizSec 2016, 13th Annual International Symposium on Visualization for Cyber Security
Mixed Method Approach to Identify Analytic Questions to be Visualized for Military Cyber Incident Handlers - Laurin Buchanan, Anita D'Amico and Drew Kirkpatrick
J-Viz: Finding algorithmic complexity attacks via graph visualization of Java bytecode - Md. Jawaherul Alam, Michael T. Goodrich, Timothy Johnson
Cesar: Visual representation of source code vulnerabilities - Hala Assal, Sonia Chiasson, Robert Biddle
CyberPetri at CDX 2016: Real-time Network Situation Awareness - Dustin Arendt, Dan Best, Russ Burtner and Celeste Lyn Paul
Visualizing a Malware Distribution Network - Sebastian Peryt, Jose Andre Morales, William Casey, Aaron Volkmann, Bud Mishra and Yang Cai
Visually guided Flow Tracking in Software-defined Networking - Tobias Post, Thomas Wischgoll, Adam R. Bryant, Bernd Hamann, Paul Müller and Hans Hagen
Detecting Malicious Logins in Enterprise Networks Using Visualization - Hossein Siadati, Bahador Saket and Nasir Memon
V3SPA: A Visual Analysis, Exploration, and Diffing Tool for SELinux and SEAndroid Security Policies - Robert Gove
Uncovering Periodic Network Signals of Cyber Attacks - Ngoc Anh Huynh, Wee Keong Ng, Alex Ulmer and Jörn Kohlhammer
Bigfoot: A Geo-based Visualization Methodology for Detecting BGP Threats - Meenakshi Syamkumar, Ramakrishnan Durairajan and Paul Barford
Visualisation of Actionable Knowledge to Mitigate DRDoS Attacks - Michael Aupetit, Yury Zhauniarovich, Giorgos Vasiliadis, Marc Dacier and Yazan Boshmaf
Understanding the Context of Network Traffic Alerts - Bram Cappers and Jarke J. van Wijk
VizSec 2015, 12th Annual International Symposium on Visualization for Cyber Security
BitConeView: Visualization of Flows in the Bitcoin Transaction Graph - Giuseppe Di Battista, Valentino Di Donato, Maurizio Patrignani, Maurizio Pizzonia, Vincenzo Roselli and Roberto Tamassia
Discovery of Rating Fraud with Real-Time Streaming Visual Analytics - Kodzo Webga and Aidong Lu
Visualizing the Insider Threat: Challenges and tools for identifying malicious user activity - Philip A. Legg
SNAPS: Semantic Network traffic Analysis through Projection and Selection - Bram C.M. Cappers and Jarke van Wijk
Visual Analytics for Cyber Red Teaming - Joseph Yuen, Benjamin Turnbull and Justin Hernandez
PERCIVAL: Proactive and rEactive attack and Response assessment for Cyber Incidents using Visual AnaLytics - Marco Angelini, Nicolas Prigent and Giuseppe Santucci
Ocelot: User-Centered Design of a Decision Support Visualization for Network Quarantine - Dustin L. Arendt, Russ Burtner, Daniel M. Best, Nathan D. Bos, John R. Gersh, Christine D. Piatko and Celeste Lyn Paul
Contextual Network Navigation to provide Situational Awareness for Network Administrators - Cameron C. Gray, Panagiotis D. Ritsos, Jonathan C. Roberts
Ensemble Visualization For Cyber Situation Awareness of Network Security Data - Lihua Hao, Christopher G. Healey and Steve E. Hutchinson
A Visual Analytics Loop for Supporting Model Development - Simon Walton, Eamonn Maguire, Min Chen
Unlocking User-Centered Design Methods for Building Cyber Security Visualizations - Sean McKenna, Diane Staheli and Miriah Meyer
VizSec 2014, 11th Annual International Symposium on Visualization for Cyber Security
OCEANS - Online Collaborative Explorative Analysis on Network Security - Siming Chen, Cong Guo, Xiaoru Yuan, Fabian Merkle, Hanna Schaefer and Thomas Ertl
Problem Characterization and Abstraction for Visual Analytics in Behavior-Based Malware Pattern Analysis - Markus Wagner, Wolfgang Aigner, Alexander Rind, Hermann Dornhackl, Konstantin Kadletz, Robert Luh and Paul Tavolato
Multiple Queries with Conditional Attributes (QCATs) for Anomaly Detection and Visualization - Simon Walton, Eamonn Maguire and Min Chen
DAVAST: Data-centric Activity Visualization at the System Level - Tobias Wüchner, Alexander Pretschner and Martin Ochoa
7 Key Challenges for Visualization in Cyber Network Defense - Daniel Best, Alex Endert and Daniel Kidwell
Visual Filter: Graphical Exploration of Network Security Log Files - Jan-Erik Stange, Johannes Landstorfer, Marian Dörk and Reto Wettach
Visualization Evaluation for Cyber Security: Trends and Future Directions - Diane Staheli, Yu Tamara, R. Jordan Crouser, Suresh Damodaran, Kevin Nam, David O'Gwynn, Lane Harrison and Sean McKenna
CORGI: Combination, Organization and Reconstruction through Graphical Interactions - Christopher Humphries, Nicolas Prigent, Christophe Bidan and Frédéric Majorczyk
NStreamAware: Real-Time Visual Analytics for Data Streams to Enhance Situational Awareness - Fabian Fischer and Daniel A. Keim
SEEM: A Scalable Visualization for Comparing Multiple Large Sets of Attributes for Malware Analysis - Robert Gove, Joshua Saxe, Sigfried Gold, Alex Long and Giacomo Bergamo
IMap: Visualizing Network Activity over Internet Maps - J. Joseph Fowler, Thienne Johnson, Paolo Simonetto, Michael Schneider, Carlos Acedo, Stephen Kobourov and Loukas Lazos
Detecting Malware Samples with Similar Image Sets - Alexander Long, Josh Saxe and Robert Gove
VizSec 2013, 10th Annual International Symposium on Visualization for Cyber Security
Visualizing PHPIDS Log Files for Better Understanding of Web Server Attacks – Mansour Alsaleh, Abdullah Alqahtani, Abdulrahman Alarifi, Abdulmalik Al-Salman
ELVIS: Extensible Log VISualization – Christopher Humphries, Nicolas Prigent, Frederic Majorczyk, Christophe Bidan
Change-Link 2.0: A Digital Forensic Tool for Visualizing Changes to Shadow Volume Data – Timothy Leschke, Charles Nicholas
CyberSAVe – Situational Awareness Visualization for Cyber Security of Smart Grid Systems – Lisa Dipippo, William Matuszak, Yan Lindsay Sun
Flexible Web Visualization for Alert Based Network Security Analytics – Lihua Hao, Christopher Healey, Steve Hutchinson
NAVSEC: A Recommender System for 3D Network Security Visualizations – Troy Nunnally, Kulsoom Abdullah, A. Selcuk Uluagac, John A. Copeland, Raheem Beyah
SRNET: A Real-time, Cross-based Anomaly Detection and Visualization System for Wireless Sensor Networks – Eirini Karapistoli, Panagiotis Sarigiannidis, Anastasios A. Economides
BGPfuse: Using Visual Feature Fusion for the Detection and Attribution of BGP Anomalies – Stavros Papadopoulos, Georgios Theodoridis, Dimitrios Tzovaras
Finding Anomalies in Time-Series using Visual Correlation for Interactive Root Cause Analysis – Florian Stoffel, Fabian Fischer, Daniel Keim
VizSec 2012, 9th Annual International Symposium on Visualization for Cyber Security
Visual Analysis of Complex Firewall Configurations – Florian Mansmann, Timo Göbel, William Cheswick
Automated Tracing and Visualization of Software Security Structure and Properties – Wenbin Fang, Barton P. Miller, James A. Kupsch
Visualization Design for Immediate High-Level Situational Assessment – Robert Erbacher
NV: Nessus Vulnerability Visualization for the Web – Lane Harrison, Riley Spahn, Mike Iannacone, Evan Downing, John R. Goodall
Visualization of Shared System Call Sequence Relationships in Large Malware Corpora – Joshua Saxe, David Mentis, Chris Greamo
MalwareVis: Entity-based Visualization of Malware Network Traces – Wei Zhuo, Yacin Nadji
Change-Link: A Digital Forensic Tool for Visualizing Changes to Directory Trees – Timothy Leschke, Alan Sherman
Visualizing Distributed Memory Computations with Hive Plots – Sophie Engle, Sean Whalen
Visual Spam Campaigns Analysis using Abstract Graphs Representation – Orestis Tsigkas, Olivier Thonnard, Dimitrios Tzovaras
DAEDALUS-VIZ: Novel Real-time 3D Visualization for Darknet Monitoring-based Alert System – Daisuke Inoue, Koei Suzuki, Mio Suzuki, Masashi Eto, Koji Nakao
VisTracer: A Visual Analytics Tool to Investigate Routing Anomalies in Traceroutes – Fabian Fischer, Johannes Fuchs, Pierre-Antoine Vervier, Florian Mansmann, Olivier Thonnard
Visualizing Semantics in Passwords: The Role of Dates – Rafael Veras, Julie Thorpe, Christopher Collins
VizSec 2011, 8th Annual International Symposium on Visualization for Cyber Security
TVi: a visual querying system for network monitoring and anomaly detection – Alberto Boschetti, Luca Salgarelli, Chris Muelder, Kwan-Liu Ma
Monitoring large IP spaces with ClockView – Christopher Kintzel, Johannes Fuchs, Florian Mansmann
Supporting the cyber analytic process using visual history on large displays – Ankit Singh, Lauren Bradel, Alex Endert, Robert Kincaid, Christopher Andrews, Chris North
Malware images: visualization and automatic classification – L. Nataraj, S. Karthikeyan, G. Jacob, B. S. Manjunath
Visual analysis of goal-directed network defense decisions – Chris Horn, Anita D'Amico
BURN: baring unknown rogue networks – Francesco Roveta, Giorgio Caviglia, Luca Di Mario, Stefano Zanero, Federico Maggi, Paolo Ciuccarelli
VizSec 2010, 7th Annual International Symposium on Visualization for Cyber Security
EMBER: A Global Perspective on Extreme Malicious Behavior – Tamara Yu, Richard Lippmann, James Riordan, Stephen Boyer
Proposing a Multi-touch Interface for Intrusion Detection Environments – Jeffrey Guenther, Fred Volk, Mark Shaneck
Visualizing Attack Graphs, Reachability, and Trust Relationships with NAVIGATOR – Matthew Chu, Kyle Ingols, Richard Lippmann, Seth Webster, Stephen Boyer
Visualizing Graph Dynamics and Similarity for Enterprise Network Security and Management – Qi Liao, Aaron Striegel, Nitesh Chawla
Visual Analysis of Code Security – John R. Goodall, Hassan Radwan, Lenny Halseth
PeekKernelFlows: Peeking into IP flows – Cynthia Wagner, Gerard Wagener, Radu State, Alexandre Dulaunoy, Thomas Engel
Visualizing Host Traffic through Graphs – Eduard Glatz
Visualizing Your Key for Secure Phone Calls And Language Independence – Michael Oehler, Dhananjay Phatak, John Krautheim
Traffic Classification Using Visual Motifs: An Empirical Evaluation – Wilson Lian, Fabian Monrose, John McHugh
Real-Time Visualization of Network Behaviors for Situational Awareness – Daniel Best, Shawn Bohn, Douglas Love, Adam Wynne, William Pike
Interactive Detection of Network Anomalies via Coordinated Multiple Views – Lane Harrison, Xianlin Hu, Xiaowei Ying, Aidong Lu, Weichao Wang, Xintao Wu
Nimble Cybersecurity Incident Management through Visualization and Defensible Recommendations – Jamie Rasmussen, Kate Ehrlich, Steven Ross, Susanna Kirk, Daniel Gruen, John Patterson
VizSec 2009, 6th Annual International Symposium on Visualization for Cyber Security
Visualization of Complex Attacks and State of Attacked Network – Anatoly Yelizarov, Dennis Gamayunov
OverFlow: An Overview Visualization for Network Analysis – Joel Glanfield, Stephen Brooks, Teryl Taylor, Diana Paterson, Christopher Smith, Carrie Gates, John McHugh
Security Visualization Tools and IPv6 Addresses – David Barrera, P.C. van Oorschot
Visualizing Compiled Executables for Malware Analysis – Daniel A. Quist, Lorie M. Liebrock
Visual Analysis of Malware Behavior Using Treemaps and Thread Graphs – Philipp Trinius, Thorsten Holz, Jan Göbel, Felix C. Freiling
A Visual Analytic Framework for Exploring Relationships in Textual Contents of Digital Forensics Evidence – T.J. Jankun-Kelly, David Wilson, Andrew S. Stamps, Josh Franck, Jeffery Carver, J. Edward Swan II
Visualizing Cyber Security: Usable Workspaces – Glenn A. Fink, Christopher L. North, Alex Endert, Stuart Rose
Visualization is Better! A Comparative Evaluation – John R. Goodall
Visualizing Keyboard Pattern Passwords – Dino Schweitzer, Jeff Boleng, Colin Hughes, Louis Murphy
Visualizing Firewall Configurations Using Created Voids – Shaun P. Morrissey, Georges Grinstein
VizSec 2008, 5th Annual International Symposium on Visualization for Cyber Security
Visual Reverse Engineering of Binary and Data Files – Gregory Conti, Erik Dean, Matthew Sinda, Benjamin Sangster
Effective Visualization of File System Access-Control – Alexander Heitzmann, Bernardo Palazzi, Charalampos Papamanthou, Roberto Tamassia
Visual Analysis of Program Flow Data with Data Propagation – Ying Xia, Kevin Fairbanks, Henry Owen
A Term Distribution Visualization Approach to Digital Forensic String Search – Moses Schwartz, L.M. Liebrock
GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool –
Leevar Williams, Richard Lippmann, Kyle Ingols
A Graph-Theoretic Visualization Approach to Network Risk Analysis – Scott O'Hare, Steven Noel, Kenneth Prole
Improving Attack Graph Visualization through Data Reduction and Attack Grouping – John Homer, Ashok Varikuti, Xinming Ou, Miles A. McQueen
Show Me How You See: Lessons from Studying Computer Forensics Experts for Visualization – T.J. Jankun-Kelly, Josh Franck, David Wilson, Jeffery Carver, David Dampier, J. Edward Swan II
A Task Centered Framework for Computer Security Data Visualization – Xiaoyuan Suo, Ying Zhu, Scott Owen
BGPeep: An IP-Space Centered View for Internet Routing Data – James Shearer, Kwan-Liu Ma, Toby Kohlenberg
Large-Scale Network Monitoring for Visual Analysis of Attacks – Fabian Fischer, Florian Mansmann, Daniel A. Keim, Stephan Pietzko, Marcel Waldvogel
Visualizing Real-Time Network Resource Usage – Ryan Blue, Cody Dunne, Adam Fuchs, Kyle King, Aaron Schulman
Wireless Cyber Assets Discovery Visualization – Kenneth Prole, John R. Goodall, Anita D. D'Amico, Jason K. Kopylec
NetFlow Data Visualization Based on Graphs – Pavel Minarik, Tomas Dymacek
Backhoe, a Packet Trace and Log Browser – Sergey Bratus, Axel Hansen, Fabio Pellacini, Anna Shubina
Existence Plots: A Low-Resolution Time Series for Port Behavior Analysis – Jeff Janies
Using Time Series 3D AlertGraph and False Alert Classification to Analyse Snort Alerts – Shahrulniza Musa, David J. Parish
Network Traffic Exploration Application: A Tool to Assess, Visualize, and Analyze Network Security Events – Grant Vandenberghe
VizSec 2007, 4th Annual International Symposium on Visualization for Cyber Security
Introduction to Visualization for Computer Security – J.R. Goodall
The Real Work of Computer Network Defense Analysts – A. D'Amico, K. Whitley
Adapting Personas for Use in Security Visualization Design – J. Stoll, D. McColgin, M. Gregory, V. Crow, W.K. Edwards
Measuring the Complexity of Computer Security Visualization Designs – X. Suo, Y. Zhu, G. Scott Owen
Integrated Environment Management for Information Operations Testbeds – T.H. Yu, B.W. Fuller, J.H. Bannick, L.M. Rossey, R.K. Cunningham
Visual Analysis of Network Flow Data with Timelines and Event Plots – D. Phan, J. Gerth, M. Lee, A. Paepcke, T. Winograd
NetBytes Viewer: An Entity-Based NetFlow Visualization Utility for Identifying Intrusive Behavior – T. Taylor, S. Brooks, J. McHugh
Visual Analysis of Corporate Network Intelligence: Abstracting and Reasoning on Yesterdays for Acting Today – D. Lalanne, E. Bertini, P. Hertzog, P. Bados
Visualizing Network Security Events Using Compound Glyphs From a Service-Oriented Perspective – J. Pearlman, P. Rheingans
High Level Internet Scale Traffic Visualization Using Hilbert Curve Mapping – B. Irwin, N. Pilkington
VisAlert: From Idea to Product – S. Foresti, J. Agutter
Visually Understanding Jam Resistant Communication – D. Schweitzer, L. Baird, W. Bahn
Visualization of Host Behavior for Network Security – F. Mansman, L. Meier, D.A. Keim
Putting Security in Context: Visual Correlation of Network Activity with Real-World Information – W.A. Pike, C. Scherrer, S. Zabriskie
An Interactive Attack Graph Cascade and Reachability Display – L. Williams, R. Lippmann, K. Ingols
Intelligent Classification and Visualization of Network Scans – C. Muelder, L. Chen, R. Thomason, K. L. Ma, T. Bartoletti
Using InetVis to Evaluate Snort and Bro Scan Detection on a Network Telescope – B. Irwin, J. P. van Riel
VizSec 2006, 3rd Annual International Symposium on Visualization for Cyber Security
Understanding multistage attacks by attack-track based visualization of heterogeneous event streams – S. Mathew, R. Giomundo, S. Upadhyaya, M. Sudit, A. Stotz
Visual toolkit for network security experiment specification and data analysis – L. Li, P. Liu, G. Kesidis
An intelligent, interactive tool for exploration and visualization of time-oriented security data – Asaf Shabtai, Denis Klimov, Yuval Shahar, Yuval Elovici
Visualizing DNS traffic – Pin Ren, John Kristoff, Bruce Gooch
Real-time collaborative network monitoring and control using 3D game engines for representation and interaction – Warren Harrop, Grenville Armitage
Using visual motifs to classify encrypted traffic – Charles V. Wright, Fabian Monrose, Gerald M. Masson
Visualization assisted detection of sybil attacks in wireless networks – Weichao Wang, Aidong Lu
Tool update: high alarm count issues in IDS rainstorm – Kulsoom Abdullah, John A. Copeland
Tool update: visflowconnect-IP with advanced filtering from usability testing – William Yurcik
Tool update: NVisionIP improvements (difference view, sparklines, and shapes) – William Yurcik
Ensuring the continuing success of VizSec – Pin Ren
VAST: visualizing autonomous system topology – Jon Oberheide, Manish Karir, Dionysus Blazakis
BGP eye: a new visualization tool for real-time detection and analysis of BGP anomalies – Soon Tee Teoh, Supranamaya Ranjan, Antonio Nucci, Chen-Nee Chuah
Discovering an RC4 anomaly through visualization – Dino Schweitzer, Leemon Baird
Visualizations to improve reactivity towards security incidents inside corporate networks – Patrick Hertzog
Flowtag: a collaborative attack-analysis, reporting, and sharing tool for security researchers – Christopher P. Lee, John A. Copeland
USEable security: interface design strategies for improving security – Amanda L. Stephano, Dennis P. Groth
Visualization for privacy compliance – George Yee
Interactively combining 2D and 3D visualization for network traffic monitoring – Erwan Le Malécot, Masayoshi Kohara, Yoshiaki Hori, Kouichi Sakurai
VizSec 2005, 2nd Annual International Symposium on Visualization for Cyber Security
IDS RainStorm: Visualizing IDS Alarms – Kulsoom Abdullah, Chris Lee, Gregory Conti, John A. Copeland, John Stasko
Visual Correlation of Host Processes and Network Traffic – Glenn A. Fink, Paul Muessig, Chris North
A User-centered Look at Glyph-based Security Visualization – Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, John R. Goodall, Amit Joshi
A Visualization Methodology for Characterization of Network Scans – Chris Muelder, Kwan-Liu Ma, Tony Bartoletti
IDGraphs: Intrusion Detection and Analysis Using Histographs – Pin Ren, Yan Gao, Zhichun Li, Yan Chen, Benjamin Watson
Preserving the Big Picture: Visual Network Traffic Analysis with TNV – John R. Goodall, Wayne G. Lutters, Penny Rheingans, Anita Komlodi
Root Polar Layout of Internet Address Data for Security Administration – Glenn A. Fink, Chris North
Visualization of Automated Trust Negotiation – Danfeng Yao, Michael Shin, Roberto Tamassia, William H. Winsborough
Closing-the-Loop in NVisionIP: Integrating Discovery and Search in Security Visualizations – Kiran Lakkaraju, Ratna Bearavolu, Adam Slagell, William Yurcik, Stephen North
Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries – Gregory Conti, Julian Grizzard, Mustaque Ahamad, Henry Owen
Visualizing Cyber Attacks Using IP Matrix – Hideki Koike, Kazuhiro Ohno and Kanba Koizumi
Multiple Coordinated Views for Network Attack Graphs – Steven Noel, Michael Jacobs, Pramod Kalapa, Sushil Jajodia
Information Assurance Visualizations for Specific Stages of Situational Awareness and Intended Uses: Lessons Learned – Anita D'Amico and Michael Kocka
Exploring Three-dimensional Visualization for Intrusion Detection – Adam Oline, Dirk Reiners
Designing Visualization Capabilities for IDS Challenges – Robert F. Erbacher, Kim Christensen, Amanda Sundberg
Visual Firewall: Real-time Network Security Monitor – Chris P. Lee, Jason Trost, Nicholas Gibbs, Raheem Beyah, John A. Copeland
VizSec 2004, Workshop on Visualization and Data Mining for Computer Security
User re-authentication via mouse movements – Maja Pusara, Carla E. Brodley
HMM profiles for network traffic classification – Charles Wright, Fabian Monrose, Gerald M. Masson
MORPHEUS: motif oriented representations to purge hostile events from unlabeled sequences – Gaurav Tandon, Philip Chan, Debasis Mitra
VisFlowConnect: netflow visualizations of link relationships for security situational awareness – Xiaoxin Yin, William Yurcik, Michael Treaster, Yifan Li, Kiran Lakkaraju
Combining visual and automated data mining for near-real-time anomaly detection and analysis in BGP – Soon Tee Teoh, Ke Zhang, Shih-Ming Tseng, Kwan-Liu Ma, S. Felix Wu
Passive visual fingerprinting of network attack tools – Gregory Conti, Kulsoom Abdullah
Home-centric visualization of network traffic for security administration – Robert Ball, Glenn A. Fink, Chris North
NVisionIP: netflow visualizations of system state for security situational awareness – Kiran Lakkaraju, William Yurcik, Adam J. Lee
PortVis: a tool for port-based detection of security events – Jonathan McPherson, Kwan-Liu Ma, Paul Krystosk, Tony Bartoletti, Marvin Christensen
Visualizing windows executable viruses using self-organizing maps – InSeon Yoo
CyberSeer: 3D audio-visual immersion for network security and management – Christos Papadopoulos, Chris Kyriakakis, Alexander Sawchuk, Xinming He
Combining a bayesian classifier with visualisation: understanding the IDS – Stefan Axelsson
Managing attack graph complexity through visual hierarchical aggregation – Steven Noel, Sushil Jajodia
Scatter (and other) plots for visualizing user profiling data and network traffic – Tom Goldring
Scalable visualization of propagating internet phenomena – Alfonso Valdes, Martin Fong
Email archive analysis through graphical visualization – Wei-Jen Li, Shlomo Hershkop, Salvatore J. Stolfo
NVisionCC: a visualization framework for high performance cluster security – William Yurcik, Xin Meng, Nadir Kiyanclar
Statistical profiling and visualization for detection of malicious insider attacks on computer networks – Jeffrey B. Colombe, Gregory Stephens
SnortView: visualization system of snort logs – Hideki Koike, Kazuhiro Ohno
End of List
- For a full list of all the articles in Tek Eye see the full site Index.
Author:Daniel S. Fowler Published: Updated: