VizSEC 2005:
Minneapolis,
MN,
USA
Kwan-Liu Ma, Stephen C. North, William Yurcik (Eds.):
IEEE Workshop on Visualization for Computer Security (VizSEC 2005), 26 October 2005, Minneapolis, MN, USA.
IEEE Computer Society 2005, ISBN 0-7803-9477-1
Cover
Introduction
Session 1
- Kulsoom Abdullah, Christopher P. Lee, Gregory J. Conti, John A. Copeland, John T. Stasko:
IDS RainStorm: Visualizing IDS Alarms.
1
- Glenn A. Fink, Paul Muessig, Chris North:
Visual Correlation of Host Processes and Network Traffic.
2
- Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, John R. Goodall, Amit Joshi:
A User-centered Look at Glyph-based Security Visualization.
3
- Chris Muelder, Kwan-Liu Ma, Tony Bartoletti:
A Visualization Methodology for Characterization of Network Scans.
4
Session 2
- Pin Ren, Yan Gao, Zhichun Li, Yan Chen, Benjamin Watson:
IDGraphs: Intrusion Detection and Analysis Using Histographs.
5
- John R. Goodall, Wayne G. Lutters, Penny Rheingans, Anita Komlodi:
Preserving the Big Picture: Visual Network Traffic Analysis with TN.
6
- Glenn A. Fink, Chris North:
Root Polar Layout of Internet Address Data for Security Administration.
7
- Danfeng Yao, Michael Shin, Roberto Tamassia, William H. Winsborough:
Visualization of Automated Trust Negotiation.
8
Session 3
- Kiran Lakkaraju, Ratna Bearavolu, Adam J. Slagell, William Yurcik, Stephen C. North:
Closing-the-Loop in NVisionIP: Integrating Discovery and Search in Security Visualizations.
9
- Gregory J. Conti, Julian B. Grizzard, Mustaque Ahamad, Henry L. Owen:
Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries.
10
- Hideki Koike, Kazuhiro Ohno, Kanba Koizumi:
Visualizing Cyber Attacks using IP Matrix.
11
- Steven Noel, Michael Jacobs, Pramod Kalapa, Sushil Jajodia:
Multiple Coordinated Views for Network Attack Graphs.
12
Session 4
Copyright © Sun Mar 14 23:29:53 2010
by Michael Ley (ley@uni-trier.de)