Visualization for Computer Security

5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings

  • Editors
  • John R. Goodall
  • Gregory Conti
  • Kwan-Liu Ma

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5210)

Table of contents

  1. Front Matter
  2. Gregory Conti, Erik Dean, Matthew Sinda, Benjamin Sangster
    Pages 1-17
  3. Alexander Heitzmann, Bernardo Palazzi, Charalampos Papamanthou, Roberto Tamassia
    Pages 18-25
  4. Ying Xia, Kevin Fairbanks, Henry Owen
    Pages 26-35
  5. Leevar Williams, Richard Lippmann, Kyle Ingols
    Pages 44-59
  6. Scott O’Hare, Steven Noel, Kenneth Prole
    Pages 60-67
  7. John Homer, Ashok Varikuti, Xinming Ou, Miles A. McQueen
    Pages 68-79
  8. T. J. Jankun-Kelly, Josh Franck, David Wilson, Jeffery Carver, David Dampier, J. Edward Swan II
    Pages 80-86
  9. Xiaoyuan Suo, Ying Zhu, Scott Owen
    Pages 87-94
  10. James Shearer, Kwan-Liu Ma, Toby Kohlenberg
    Pages 95-110
  11. Fabian Fischer, Florian Mansmann, Daniel A. Keim, Stephan Pietzko, Marcel Waldvogel
    Pages 111-118
  12. Ryan Blue, Cody Dunne, Adam Fuchs, Kyle King, Aaron Schulman
    Pages 119-135
  13. Kenneth Prole, John R. Goodall, Anita D. D’Amico, Jason K. Kopylec
    Pages 136-143
  14. Pavel Minarik, Tomas Dymacek
    Pages 144-151
  15. Sergey Bratus, Axel Hansen, Fabio Pellacini, Anna Shubina
    Pages 152-160
  16. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 5th International Workshop on Visualization for Cyber Security held on September 15, 2008, in Cambridge, Massachusetts, USA, in conjunction with the 11th International Symposium on Recent Advances in Intrusion Detection (RAID).

The 18 papers presented in this volume were carefully reviewed and selected from 27 submissions. VizSec research has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense. This year's paper focus on bridging the gap between visualization and automation.

Keywords

Bridge Bridging computer forensics cyber security data visualizaion information security information visualization network monitoring network traffic exploration reachability reverse engineering risk analysis visualization vizsec

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-85933-8
  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-85931-4
  • Online ISBN 978-3-540-85933-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book