Visualization for Computer Security

5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings

Editors:

ISBN: 978-3-540-85931-4 (Print) 978-3-540-85933-8 (Online)

Table of contents (18 chapters)

  1. Front Matter

    Pages -

  2. No Access

    Book Chapter

    Pages 1-17

    Visual Reverse Engineering of Binary and Data Files

  3. No Access

    Book Chapter

    Pages 18-25

    Effective Visualization of File System Access-Control

  4. No Access

    Book Chapter

    Pages 26-35

    Visual Analysis of Program Flow Data with Data Propagation

  5. No Access

    Book Chapter

    Pages 36-43

    A Term Distribution Visualization Approach to Digital Forensic String Search

  6. No Access

    Book Chapter

    Pages 44-59

    GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool

  7. No Access

    Book Chapter

    Pages 60-67

    A Graph-Theoretic Visualization Approach to Network Risk Analysis

  8. No Access

    Book Chapter

    Pages 68-79

    Improving Attack Graph Visualization through Data Reduction and Attack Grouping

  9. No Access

    Book Chapter

    Pages 80-86

    Show Me How You See: Lessons from Studying Computer Forensics Experts for Visualization

  10. No Access

    Book Chapter

    Pages 87-94

    A Task Centered Framework for Computer Security Data Visualization

  11. No Access

    Book Chapter

    Pages 95-110

    BGPeep: An IP-Space Centered View for Internet Routing Data

  12. No Access

    Book Chapter

    Pages 111-118

    Large-Scale Network Monitoring for Visual Analysis of Attacks

  13. No Access

    Book Chapter

    Pages 119-135

    Visualizing Real-Time Network Resource Usage

  14. No Access

    Book Chapter

    Pages 136-143

    Wireless Cyber Assets Discovery Visualization

  15. No Access

    Book Chapter

    Pages 144-151

    NetFlow Data Visualization Based on Graphs

  16. No Access

    Book Chapter

    Pages 152-160

    Backhoe, a Packet Trace and Log Browser

  17. No Access

    Book Chapter

    Pages 161-168

    Existence Plots: A Low-Resolution Time Series for Port Behavior Analysis

  18. No Access

    Book Chapter

    Pages 169-180

    Using Time Series 3D AlertGraph and False Alert Classification to Analyse Snort Alerts

  19. No Access

    Book Chapter

    Pages 181-196

    Network Traffic Exploration Application: A Tool to Assess, Visualize, and Analyze Network Security Events

  20. Back Matter

    Pages -