default search action
VizSEC 2016: Baltimore, MD, USA
- Daniel M. Best, Diane Staheli, Nicolas Prigent, Sophie Engle, Lane Harrison:
13th IEEE Symposium on Visualization for Cyber Security, VizSec 2016, Baltimore, MD, USA, October 24, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-1605-1
Papers
- Md. Jawaherul Alam, Michael T. Goodrich, Timothy Johnson:
J-Viz: Finding algorithmic complexity attacks via graph visualization of Java bytecode. 1-8 - Hala Assal, Sonia Chiasson, Robert Biddle:
Cesar: Visual representation of source code vulnerabilities. 1-8 - Michaël Aupetit, Yury Zhauniarovich, Giorgos Vasiliadis, Marc Dacier, Yazan Boshmaf:
Visualization of actionable knowledge to mitigate DRDoS attacks. 1-8 - Laurin Buchanan, Anita D'Amico, Drew Kirkpatrick:
Mixed method approach to identify analytic questions to be visualized for military cyber incident handlers. 1-8 - Bram C. M. Cappers, Jarke J. van Wijk:
Understanding the context of network traffic alerts. 1-8 - Robert Gove:
V3SPA: A visual analysis, exploration, and diffing tool for SELinux and SEAndroid security policies. 1-8 - Huynh Ngoc Anh, Wee Keong Ng, Alex Ulmer, Jörn Kohlhammer:
Uncovering periodic network signals of cyber attacks. 1-8 - Hossein Siadati, Bahador Saket, Nasir D. Memon:
Detecting malicious logins in enterprise networks using visualization. 1-8 - Meenakshi Syamkumar, Ramakrishnan Durairajan, Paul Barford:
Bigfoot: A geo-based visualization methodology for detecting BGP threats. 1-8
Case Studies
- Dustin Arendt, Daniel M. Best, Russ Burtner, Celeste Lyn Paul:
CyberPetri at CDX 2016: Real-time network situation awareness. 1-4 - Sebastian Peryt, Jose Andre Morales, William Casey, Aaron Volkmann, Bud Mishra, Yang Cai:
Visualizing a Malware Distribution Network. 1-4 - Tobias Post, Thomas Wischgoll, Adam R. Bryant, Bernd Hamann, Paul Müller, Hans Hagen:
Visually guided flow tracking in software-defined networking. 1-4
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.