VizSEC 2007

Proceedings of the Workshop on Visualization for Computer Security

Editors:

ISBN: 978-3-540-78242-1 (Print) 978-3-540-78243-8 (Online)

Table of contents (17 chapters)

  1. Front Matter

    Pages i-xv

  2. No Access

    Book Chapter

    Pages 1-17

    Introduction to Visualization for Computer Security

  3. No Access

    Book Chapter

    Pages 19-37

    The Real Work of Computer Network Defense Analysts

  4. No Access

    Book Chapter

    Pages 39-52

    Adapting Personas for Use in Security Visualization Design

  5. No Access

    Book Chapter

    Pages 53-66

    Measuring the Complexity of Computer Security Visualization Designs

  6. No Access

    Book Chapter

    Pages 67-83

    Integrated Environment Management for Information Operations Testbeds

  7. No Access

    Book Chapter

    Pages 85-99

    Visual Analysis of Network Flow Data with Timelines and Event Plots

  8. No Access

    Book Chapter

    Pages 101-114

    NetBytes Viewer: An Entity-Based NetFlow Visualization Utility for Identifying Intrusive Behavior

  9. No Access

    Book Chapter

    Pages 115-130

    Visual Analysis of Corporate Network Intelligence: Abstracting and Reasoning on Yesterdays for Acting Today

  10. No Access

    Book Chapter

    Pages 131-146

    Visualizing Network Security Events Using Compound Glyphs from a Service-Oriented Perspective

  11. No Access

    Book Chapter

    Pages 147-158

    High Level Internet Scale Traffic Visualization Using Hilbert Curve Mapping

  12. No Access

    Book Chapter

    Pages 159-174

    VisAlert: From Idea to Product

  13. No Access

    Book Chapter

    Pages 175-186

    Visually Understanding Jam Resistant Communication

  14. No Access

    Book Chapter

    Pages 187-202

    Visualization of Host Behavior for Network Security

  15. No Access

    Book Chapter

    Pages 203-220

    Putting Security in Context: Visual Correlation of Network Activity with Real-World Information

  16. No Access

    Book Chapter

    Pages 221-236

    An Interactive Attack Graph Cascade and Reachability Display

  17. No Access

    Book Chapter

    Pages 237-253

    Intelligent Classification and Visualization of Network Scans

  18. No Access

    Book Chapter

    Pages 255-273

    Using InetVis to Evaluate Snort and Bro Scan Detection on a Network Telescope