![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
VizSEC 2005: Minneapolis, MN, USA
- Kwan-Liu Ma, Stephen C. North, William Yurcik:
2nd IEEE Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005. IEEE Computer Society 2005, ISBN 0-7803-9477-1
Cover
- Title Page.
- Copyright.
Introduction
- Preface.
- Committees.
Session 1
- Kulsoom Abdullah, Christopher P. Lee, Gregory J. Conti, John A. Copeland, John T. Stasko:
IDS RainStorm: Visualizing IDS Alarms. 1 - Glenn A. Fink, Paul Muessig, Chris North:
Visual Correlation of Host Processes and Network Traffic. 2 - Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, John R. Goodall, Amit Joshi:
A User-centered Look at Glyph-based Security Visualization. 3 - Chris Muelder, Kwan-Liu Ma, Tony Bartoletti:
A Visualization Methodology for Characterization of Network Scans. 4
Session 2
- Pin Ren, Yan Gao, Zhichun Li, Yan Chen, Benjamin Watson:
IDGraphs: Intrusion Detection and Analysis Using Histographs. 5 - John R. Goodall, Wayne G. Lutters, Penny Rheingans, Anita Komlodi:
Preserving the Big Picture: Visual Network Traffic Analysis with TN. 6 - Glenn A. Fink, Chris North:
Root Polar Layout of Internet Address Data for Security Administration. 7 - Danfeng Yao, Michael Shin, Roberto Tamassia, William H. Winsborough:
Visualization of Automated Trust Negotiation. 8
Session 3
- Kiran Lakkaraju, Ratna Bearavolu, Adam J. Slagell, William Yurcik, Stephen C. North:
Closing-the-Loop in NVisionIP: Integrating Discovery and Search in Security Visualizations. 9 - Gregory J. Conti, Julian B. Grizzard, Mustaque Ahamad, Henry L. Owen:
Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries. 10 - Hideki Koike, Kazuhiro Ohno, Kanba Koizumi:
Visualizing Cyber Attacks using IP Matrix. 11 - Steven Noel, Michael Jacobs, Pramod Kalapa, Sushil Jajodia:
Multiple Coordinated Views for Network Attack Graphs. 12
Session 4
- Anita D'Amico, Michael Kocka:
Information Assurance Visualizations for Specific Stages of Situational Awareness and Intended Uses: Lessons Learned. 13 - Adam Oline, Dirk Reiners:
Exploring Three-dimensional Visualization for Intrusion Detection. 14 - Robert F. Erbacher, Kim Christensen, Amanda Sundberg:
Designing Visualization Capabilities for IDS Challenges. 15 - Christopher P. Lee, Jason Trost, Nicholas Gibbs, Raheem A. Beyah, John A. Copeland:
Visual Firewall: Real-time Network Security Monito. 16
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.