Tek Eye Logo

Tek Eye

Visualization for Cyber Security Conference List of Papers

Whilst researching novel methods for visualising data from computer security systems the VizSec conference proceedings looked interesting. VizSec is short for Visualization for Cyber Security. This is an annual symposium dedicated to the use of visualisation techniques to help with the complexity of monitoring the large modern systems we all use. System security has become a big data problem and only efficient data analytics and visual analytics will help manage it.

VizSec Logo

All Papers from the Annual Visualization For Cyber Security Symposium

When first researching cyber-security data visualization the 11th International Symposium on Visualization for Cyber Security was about to take place (November 2014). At the time the papers from the previous 10 years of symposiums were available from different institutional or publisher web sites. It meant there was not a single search available to get one list of all the papers presented at VizSec over the years. Therefore visits to several web pages and web sites were required to put together the list of all previous VizSec Symposium papers. This article was written to address that issue. The full list of VizSec papers was given in this article, providing a service that saved others from having to do the same.

Since then another source of all the papers has been provided. The VizSec Proceedings Browser lists all the papers from all the VizSec Symposiums. A good a tool for promoting the work of visual analytics as applied to cyber-security. Even better is that links are provided to the paper's publishing site.

Visualisation or Visualization

A note on the spelling of visualisation and visualization. Both are valid forms. The version with the Z is common in the Americas, the version with the S is common with British speakers. Since this web site is based in the United Kingdom (UK) the latter is used in general text. The conference is organised from the United States hence the spelling of visualization in the conference title. It is worth noting that the use of visualization is more common than visualisation when Googling (searching the Internet).

List of Papers in the Proceedings of the Annual International Symposium on Visualization for Cyber Security

VizSec 2016, 13th Annual International Symposium on Visualization for Cyber Security

Mixed Method Approach to Identify Analytic Questions to be Visualized for Military Cyber Incident Handlers - Laurin Buchanan, Anita D'Amico and Drew Kirkpatrick

J-Viz: Finding algorithmic complexity attacks via graph visualization of Java bytecode - Md. Jawaherul Alam, Michael T. Goodrich, Timothy Johnson

Cesar: Visual representation of source code vulnerabilities - Hala Assal, Sonia Chiasson, Robert Biddle

CyberPetri at CDX 2016: Real-time Network Situation Awareness - Dustin Arendt, Dan Best, Russ Burtner and Celeste Lyn Paul

Visualizing a Malware Distribution Network - Sebastian Peryt, Jose Andre Morales, William Casey, Aaron Volkmann, Bud Mishra and Yang Cai

Visually guided Flow Tracking in Software-defined Networking - Tobias Post, Thomas Wischgoll, Adam R. Bryant, Bernd Hamann, Paul Müller and Hans Hagen

Detecting Malicious Logins in Enterprise Networks Using Visualization - Hossein Siadati, Bahador Saket and Nasir Memon

V3SPA: A Visual Analysis, Exploration, and Diffing Tool for SELinux and SEAndroid Security Policies - Robert Gove

Uncovering Periodic Network Signals of Cyber Attacks - Ngoc Anh Huynh, Wee Keong Ng, Alex Ulmer and Jörn Kohlhammer

Bigfoot: A Geo-based Visualization Methodology for Detecting BGP Threats - Meenakshi Syamkumar, Ramakrishnan Durairajan and Paul Barford

Visualisation of Actionable Knowledge to Mitigate DRDoS Attacks - Michael Aupetit, Yury Zhauniarovich, Giorgos Vasiliadis, Marc Dacier and Yazan Boshmaf

Understanding the Context of Network Traffic Alerts - Bram Cappers and Jarke J. van Wijk

VizSec 2015, 12th Annual International Symposium on Visualization for Cyber Security

BitConeView: Visualization of Flows in the Bitcoin Transaction Graph - Giuseppe Di Battista, Valentino Di Donato, Maurizio Patrignani, Maurizio Pizzonia, Vincenzo Roselli and Roberto Tamassia

Discovery of Rating Fraud with Real-Time Streaming Visual Analytics - Kodzo Webga and Aidong Lu

Visualizing the Insider Threat: Challenges and tools for identifying malicious user activity - Philip A. Legg

SNAPS: Semantic Network traffic Analysis through Projection and Selection - Bram C.M. Cappers and Jarke van Wijk

Visual Analytics for Cyber Red Teaming - Joseph Yuen, Benjamin Turnbull and Justin Hernandez

PERCIVAL: Proactive and rEactive attack and Response assessment for Cyber Incidents using Visual AnaLytics - Marco Angelini, Nicolas Prigent and Giuseppe Santucci

Ocelot: User-Centered Design of a Decision Support Visualization for Network Quarantine - Dustin L. Arendt, Russ Burtner, Daniel M. Best, Nathan D. Bos, John R. Gersh, Christine D. Piatko and Celeste Lyn Paul

Contextual Network Navigation to provide Situational Awareness for Network Administrators - Cameron C. Gray, Panagiotis D. Ritsos, Jonathan C. Roberts

Ensemble Visualization For Cyber Situation Awareness of Network Security Data - Lihua Hao, Christopher G. Healey and Steve E. Hutchinson

A Visual Analytics Loop for Supporting Model Development - Simon Walton, Eamonn Maguire, Min Chen

Unlocking User-Centered Design Methods for Building Cyber Security Visualizations - Sean McKenna, Diane Staheli and Miriah Meyer

VizSec 2014, 11th Annual International Symposium on Visualization for Cyber Security

OCEANS - Online Collaborative Explorative Analysis on Network Security - Siming Chen, Cong Guo, Xiaoru Yuan, Fabian Merkle, Hanna Schaefer and Thomas Ertl

Problem Characterization and Abstraction for Visual Analytics in Behavior-Based Malware Pattern Analysis - Markus Wagner, Wolfgang Aigner, Alexander Rind, Hermann Dornhackl, Konstantin Kadletz, Robert Luh and Paul Tavolato

Multiple Queries with Conditional Attributes (QCATs) for Anomaly Detection and Visualization - Simon Walton, Eamonn Maguire and Min Chen

DAVAST: Data-centric Activity Visualization at the System Level - Tobias Wüchner, Alexander Pretschner and Martin Ochoa

7 Key Challenges for Visualization in Cyber Network Defense - Daniel Best, Alex Endert and Daniel Kidwell

Visual Filter: Graphical Exploration of Network Security Log Files - Jan-Erik Stange, Johannes Landstorfer, Marian Dörk and Reto Wettach

Visualization Evaluation for Cyber Security: Trends and Future Directions - Diane Staheli, Yu Tamara, R. Jordan Crouser, Suresh Damodaran, Kevin Nam, David O'Gwynn, Lane Harrison and Sean McKenna

CORGI: Combination, Organization and Reconstruction through Graphical Interactions - Christopher Humphries, Nicolas Prigent, Christophe Bidan and Frédéric Majorczyk

NStreamAware: Real-Time Visual Analytics for Data Streams to Enhance Situational Awareness - Fabian Fischer and Daniel A. Keim

SEEM: A Scalable Visualization for Comparing Multiple Large Sets of Attributes for Malware Analysis - Robert Gove, Joshua Saxe, Sigfried Gold, Alex Long and Giacomo Bergamo

IMap: Visualizing Network Activity over Internet Maps - J. Joseph Fowler, Thienne Johnson, Paolo Simonetto, Michael Schneider, Carlos Acedo, Stephen Kobourov and Loukas Lazos

Detecting Malware Samples with Similar Image Sets - Alexander Long, Josh Saxe and Robert Gove

VizSec 2013, 10th Annual International Symposium on Visualization for Cyber Security

Visualizing PHPIDS Log Files for Better Understanding of Web Server Attacks – Mansour Alsaleh, Abdullah Alqahtani, Abdulrahman Alarifi, Abdulmalik Al-Salman

ELVIS: Extensible Log VISualization – Christopher Humphries, Nicolas Prigent, Frederic Majorczyk, Christophe Bidan

Change-Link 2.0: A Digital Forensic Tool for Visualizing Changes to Shadow Volume Data – Timothy Leschke, Charles Nicholas

CyberSAVe – Situational Awareness Visualization for Cyber Security of Smart Grid Systems – Lisa Dipippo, William Matuszak, Yan Lindsay Sun

Flexible Web Visualization for Alert Based Network Security Analytics – Lihua Hao, Christopher Healey, Steve Hutchinson

NAVSEC: A Recommender System for 3D Network Security Visualizations – Troy Nunnally, Kulsoom Abdullah, A. Selcuk Uluagac, John A. Copeland, Raheem Beyah

SRNET: A Real-time, Cross-based Anomaly Detection and Visualization System for Wireless Sensor Networks – Eirini Karapistoli, Panagiotis Sarigiannidis, Anastasios A. Economides

BGPfuse: Using Visual Feature Fusion for the Detection and Attribution of BGP Anomalies – Stavros Papadopoulos, Georgios Theodoridis, Dimitrios Tzovaras

Finding Anomalies in Time-Series using Visual Correlation for Interactive Root Cause Analysis – Florian Stoffel, Fabian Fischer, Daniel Keim

VizSec 2012, 9th Annual International Symposium on Visualization for Cyber Security

Visual Analysis of Complex Firewall Configurations – Florian Mansmann, Timo Göbel, William Cheswick

Automated Tracing and Visualization of Software Security Structure and Properties – Wenbin Fang, Barton P. Miller, James A. Kupsch

Visualization Design for Immediate High-Level Situational Assessment – Robert Erbacher

NV: Nessus Vulnerability Visualization for the Web – Lane Harrison, Riley Spahn, Mike Iannacone, Evan Downing, John R. Goodall

Visualization of Shared System Call Sequence Relationships in Large Malware Corpora – Joshua Saxe, David Mentis, Chris Greamo

MalwareVis: Entity-based Visualization of Malware Network Traces – Wei Zhuo, Yacin Nadji

Change-Link: A Digital Forensic Tool for Visualizing Changes to Directory Trees – Timothy Leschke, Alan Sherman

Visualizing Distributed Memory Computations with Hive Plots – Sophie Engle, Sean Whalen

Visual Spam Campaigns Analysis using Abstract Graphs Representation – Orestis Tsigkas, Olivier Thonnard, Dimitrios Tzovaras

DAEDALUS-VIZ: Novel Real-time 3D Visualization for Darknet Monitoring-based Alert System – Daisuke Inoue, Koei Suzuki, Mio Suzuki, Masashi Eto, Koji Nakao

VisTracer: A Visual Analytics Tool to Investigate Routing Anomalies in Traceroutes – Fabian Fischer, Johannes Fuchs, Pierre-Antoine Vervier, Florian Mansmann, Olivier Thonnard

Visualizing Semantics in Passwords: The Role of Dates – Rafael Veras, Julie Thorpe, Christopher Collins

VizSec 2011, 8th Annual International Symposium on Visualization for Cyber Security

TVi: a visual querying system for network monitoring and anomaly detection – Alberto Boschetti, Luca Salgarelli, Chris Muelder, Kwan-Liu Ma

Monitoring large IP spaces with ClockView – Christopher Kintzel, Johannes Fuchs, Florian Mansmann

Supporting the cyber analytic process using visual history on large displays – Ankit Singh, Lauren Bradel, Alex Endert, Robert Kincaid, Christopher Andrews, Chris North

Malware images: visualization and automatic classification – L. Nataraj, S. Karthikeyan, G. Jacob, B. S. Manjunath

Visual analysis of goal-directed network defense decisions – Chris Horn, Anita D'Amico

BURN: baring unknown rogue networks – Francesco Roveta, Giorgio Caviglia, Luca Di Mario, Stefano Zanero, Federico Maggi, Paolo Ciuccarelli

VizSec 2010, 7th Annual International Symposium on Visualization for Cyber Security

EMBER: A Global Perspective on Extreme Malicious Behavior – Tamara Yu, Richard Lippmann, James Riordan, Stephen Boyer

Proposing a Multi-touch Interface for Intrusion Detection Environments – Jeffrey Guenther, Fred Volk, Mark Shaneck

Visualizing Attack Graphs, Reachability, and Trust Relationships with NAVIGATOR – Matthew Chu, Kyle Ingols, Richard Lippmann, Seth Webster, Stephen Boyer

Visualizing Graph Dynamics and Similarity for Enterprise Network Security and Management – Qi Liao, Aaron Striegel, Nitesh Chawla

Visual Analysis of Code Security – John R. Goodall, Hassan Radwan, Lenny Halseth

PeekKernelFlows: Peeking into IP flows – Cynthia Wagner, Gerard Wagener, Radu State, Alexandre Dulaunoy, Thomas Engel

Visualizing Host Traffic through Graphs – Eduard Glatz

Visualizing Your Key for Secure Phone Calls And Language Independence – Michael Oehler, Dhananjay Phatak, John Krautheim

Traffic Classification Using Visual Motifs: An Empirical Evaluation – Wilson Lian, Fabian Monrose, John McHugh

Real-Time Visualization of Network Behaviors for Situational Awareness – Daniel Best, Shawn Bohn, Douglas Love, Adam Wynne, William Pike

Interactive Detection of Network Anomalies via Coordinated Multiple Views – Lane Harrison, Xianlin Hu, Xiaowei Ying, Aidong Lu, Weichao Wang, Xintao Wu

Nimble Cybersecurity Incident Management through Visualization and Defensible Recommendations – Jamie Rasmussen, Kate Ehrlich, Steven Ross, Susanna Kirk, Daniel Gruen, John Patterson

VizSec 2009, 6th Annual International Symposium on Visualization for Cyber Security

Visualization of Complex Attacks and State of Attacked Network – Anatoly Yelizarov, Dennis Gamayunov

OverFlow: An Overview Visualization for Network Analysis – Joel Glanfield, Stephen Brooks, Teryl Taylor, Diana Paterson, Christopher Smith, Carrie Gates, John McHugh

Security Visualization Tools and IPv6 Addresses – David Barrera, P.C. van Oorschot

Visualizing Compiled Executables for Malware Analysis – Daniel A. Quist, Lorie M. Liebrock

Visual Analysis of Malware Behavior Using Treemaps and Thread Graphs – Philipp Trinius, Thorsten Holz, Jan Göbel, Felix C. Freiling

A Visual Analytic Framework for Exploring Relationships in Textual Contents of Digital Forensics Evidence – T.J. Jankun-Kelly, David Wilson, Andrew S. Stamps, Josh Franck, Jeffery Carver, J. Edward Swan II

Visualizing Cyber Security: Usable Workspaces – Glenn A. Fink, Christopher L. North, Alex Endert, Stuart Rose

Visualization is Better! A Comparative Evaluation – John R. Goodall

Visualizing Keyboard Pattern Passwords – Dino Schweitzer, Jeff Boleng, Colin Hughes, Louis Murphy

Visualizing Firewall Configurations Using Created Voids – Shaun P. Morrissey, Georges Grinstein

VizSec 2008, 5th Annual International Symposium on Visualization for Cyber Security

Visual Reverse Engineering of Binary and Data Files – Gregory Conti, Erik Dean, Matthew Sinda, Benjamin Sangster

Effective Visualization of File System Access-Control – Alexander Heitzmann, Bernardo Palazzi, Charalampos Papamanthou, Roberto Tamassia

Visual Analysis of Program Flow Data with Data Propagation – Ying Xia, Kevin Fairbanks, Henry Owen

A Term Distribution Visualization Approach to Digital Forensic String Search – Moses Schwartz, L.M. Liebrock

GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool
Leevar Williams, Richard Lippmann, Kyle Ingols

A Graph-Theoretic Visualization Approach to Network Risk Analysis – Scott O'Hare, Steven Noel, Kenneth Prole

Improving Attack Graph Visualization through Data Reduction and Attack Grouping – John Homer, Ashok Varikuti, Xinming Ou, Miles A. McQueen

Show Me How You See: Lessons from Studying Computer Forensics Experts for Visualization – T.J. Jankun-Kelly, Josh Franck, David Wilson, Jeffery Carver, David Dampier, J. Edward Swan II

A Task Centered Framework for Computer Security Data Visualization – Xiaoyuan Suo, Ying Zhu, Scott Owen

BGPeep: An IP-Space Centered View for Internet Routing Data – James Shearer, Kwan-Liu Ma, Toby Kohlenberg

Large-Scale Network Monitoring for Visual Analysis of Attacks – Fabian Fischer, Florian Mansmann, Daniel A. Keim, Stephan Pietzko, Marcel Waldvogel

Visualizing Real-Time Network Resource Usage – Ryan Blue, Cody Dunne, Adam Fuchs, Kyle King, Aaron Schulman

Wireless Cyber Assets Discovery Visualization – Kenneth Prole, John R. Goodall, Anita D. D'Amico, Jason K. Kopylec

NetFlow Data Visualization Based on Graphs – Pavel Minarik, Tomas Dymacek

Backhoe, a Packet Trace and Log Browser – Sergey Bratus, Axel Hansen, Fabio Pellacini, Anna Shubina

Existence Plots: A Low-Resolution Time Series for Port Behavior Analysis – Jeff Janies

Using Time Series 3D AlertGraph and False Alert Classification to Analyse Snort Alerts – Shahrulniza Musa, David J. Parish

Network Traffic Exploration Application: A Tool to Assess, Visualize, and Analyze Network Security Events – Grant Vandenberghe

VizSec 2007, 4th Annual International Symposium on Visualization for Cyber Security

Introduction to Visualization for Computer Security – J.R. Goodall

The Real Work of Computer Network Defense Analysts – A. D'Amico, K. Whitley

Adapting Personas for Use in Security Visualization Design – J. Stoll, D. McColgin, M. Gregory, V. Crow, W.K. Edwards

Measuring the Complexity of Computer Security Visualization Designs – X. Suo, Y. Zhu, G. Scott Owen

Integrated Environment Management for Information Operations Testbeds – T.H. Yu, B.W. Fuller, J.H. Bannick, L.M. Rossey, R.K. Cunningham

Visual Analysis of Network Flow Data with Timelines and Event Plots – D. Phan, J. Gerth, M. Lee, A. Paepcke, T. Winograd

NetBytes Viewer: An Entity-Based NetFlow Visualization Utility for Identifying Intrusive Behavior – T. Taylor, S. Brooks, J. McHugh

Visual Analysis of Corporate Network Intelligence: Abstracting and Reasoning on Yesterdays for Acting Today – D. Lalanne, E. Bertini, P. Hertzog, P. Bados

Visualizing Network Security Events Using Compound Glyphs From a Service-Oriented Perspective – J. Pearlman, P. Rheingans

High Level Internet Scale Traffic Visualization Using Hilbert Curve Mapping – B. Irwin, N. Pilkington

VisAlert: From Idea to Product – S. Foresti, J. Agutter

Visually Understanding Jam Resistant Communication – D. Schweitzer, L. Baird, W. Bahn

Visualization of Host Behavior for Network Security – F. Mansman, L. Meier, D.A. Keim

Putting Security in Context: Visual Correlation of Network Activity with Real-World Information – W.A. Pike, C. Scherrer, S. Zabriskie

An Interactive Attack Graph Cascade and Reachability Display – L. Williams, R. Lippmann, K. Ingols

Intelligent Classification and Visualization of Network Scans – C. Muelder, L. Chen, R. Thomason, K. L. Ma, T. Bartoletti

Using InetVis to Evaluate Snort and Bro Scan Detection on a Network Telescope – B. Irwin, J. P. van Riel

VizSec 2006, 3rd Annual International Symposium on Visualization for Cyber Security

Understanding multistage attacks by attack-track based visualization of heterogeneous event streams – S. Mathew, R. Giomundo, S. Upadhyaya, M. Sudit, A. Stotz

Visual toolkit for network security experiment specification and data analysis – L. Li, P. Liu, G. Kesidis

An intelligent, interactive tool for exploration and visualization of time-oriented security data – Asaf Shabtai, Denis Klimov, Yuval Shahar, Yuval Elovici

Visualizing DNS traffic – Pin Ren, John Kristoff, Bruce Gooch

Real-time collaborative network monitoring and control using 3D game engines for representation and interaction – Warren Harrop, Grenville Armitage

Using visual motifs to classify encrypted traffic – Charles V. Wright, Fabian Monrose, Gerald M. Masson

Visualization assisted detection of sybil attacks in wireless networks – Weichao Wang, Aidong Lu

Tool update: high alarm count issues in IDS rainstorm – Kulsoom Abdullah, John A. Copeland

Tool update: visflowconnect-IP with advanced filtering from usability testing – William Yurcik

Tool update: NVisionIP improvements (difference view, sparklines, and shapes) – William Yurcik

Ensuring the continuing success of VizSec – Pin Ren

VAST: visualizing autonomous system topology – Jon Oberheide, Manish Karir, Dionysus Blazakis

BGP eye: a new visualization tool for real-time detection and analysis of BGP anomalies – Soon Tee Teoh, Supranamaya Ranjan, Antonio Nucci, Chen-Nee Chuah

Discovering an RC4 anomaly through visualization – Dino Schweitzer, Leemon Baird

Visualizations to improve reactivity towards security incidents inside corporate networks – Patrick Hertzog

Flowtag: a collaborative attack-analysis, reporting, and sharing tool for security researchers – Christopher P. Lee, John A. Copeland

USEable security: interface design strategies for improving security – Amanda L. Stephano, Dennis P. Groth

Visualization for privacy compliance – George Yee

Interactively combining 2D and 3D visualization for network traffic monitoring – Erwan Le Malécot, Masayoshi Kohara, Yoshiaki Hori, Kouichi Sakurai

VizSec 2005, 2nd Annual International Symposium on Visualization for Cyber Security

IDS RainStorm: Visualizing IDS Alarms – Kulsoom Abdullah, Chris Lee, Gregory Conti, John A. Copeland, John Stasko

Visual Correlation of Host Processes and Network Traffic – Glenn A. Fink, Paul Muessig, Chris North

A User-centered Look at Glyph-based Security Visualization – Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, John R. Goodall, Amit Joshi

A Visualization Methodology for Characterization of Network Scans – Chris Muelder, Kwan-Liu Ma, Tony Bartoletti

IDGraphs: Intrusion Detection and Analysis Using Histographs – Pin Ren, Yan Gao, Zhichun Li, Yan Chen, Benjamin Watson

Preserving the Big Picture: Visual Network Traffic Analysis with TNV – John R. Goodall, Wayne G. Lutters, Penny Rheingans, Anita Komlodi

Root Polar Layout of Internet Address Data for Security Administration – Glenn A. Fink, Chris North

Visualization of Automated Trust Negotiation – Danfeng Yao, Michael Shin, Roberto Tamassia, William H. Winsborough

Closing-the-Loop in NVisionIP: Integrating Discovery and Search in Security Visualizations – Kiran Lakkaraju, Ratna Bearavolu, Adam Slagell, William Yurcik, Stephen North

Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries – Gregory Conti, Julian Grizzard, Mustaque Ahamad, Henry Owen

Visualizing Cyber Attacks Using IP Matrix – Hideki Koike, Kazuhiro Ohno and Kanba Koizumi

Multiple Coordinated Views for Network Attack Graphs – Steven Noel, Michael Jacobs, Pramod Kalapa, Sushil Jajodia

Information Assurance Visualizations for Specific Stages of Situational Awareness and Intended Uses: Lessons Learned – Anita D'Amico and Michael Kocka

Exploring Three-dimensional Visualization for Intrusion Detection – Adam Oline, Dirk Reiners

Designing Visualization Capabilities for IDS Challenges – Robert F. Erbacher, Kim Christensen, Amanda Sundberg

Visual Firewall: Real-time Network Security Monitor – Chris P. Lee, Jason Trost, Nicholas Gibbs, Raheem Beyah, John A. Copeland

VizSec 2004, Workshop on Visualization and Data Mining for Computer Security

User re-authentication via mouse movements – Maja Pusara, Carla E. Brodley

HMM profiles for network traffic classification – Charles Wright, Fabian Monrose, Gerald M. Masson

MORPHEUS: motif oriented representations to purge hostile events from unlabeled sequences – Gaurav Tandon, Philip Chan, Debasis Mitra

VisFlowConnect: netflow visualizations of link relationships for security situational awareness – Xiaoxin Yin, William Yurcik, Michael Treaster, Yifan Li, Kiran Lakkaraju

Combining visual and automated data mining for near-real-time anomaly detection and analysis in BGP – Soon Tee Teoh, Ke Zhang, Shih-Ming Tseng, Kwan-Liu Ma, S. Felix Wu

Passive visual fingerprinting of network attack tools – Gregory Conti, Kulsoom Abdullah

Home-centric visualization of network traffic for security administration – Robert Ball, Glenn A. Fink, Chris North

NVisionIP: netflow visualizations of system state for security situational awareness – Kiran Lakkaraju, William Yurcik, Adam J. Lee

PortVis: a tool for port-based detection of security events – Jonathan McPherson, Kwan-Liu Ma, Paul Krystosk, Tony Bartoletti, Marvin Christensen

Visualizing windows executable viruses using self-organizing maps – InSeon Yoo

CyberSeer: 3D audio-visual immersion for network security and management – Christos Papadopoulos, Chris Kyriakakis, Alexander Sawchuk, Xinming He

Combining a bayesian classifier with visualisation: understanding the IDS – Stefan Axelsson

Managing attack graph complexity through visual hierarchical aggregation – Steven Noel, Sushil Jajodia

Scatter (and other) plots for visualizing user profiling data and network traffic – Tom Goldring

Scalable visualization of propagating internet phenomena – Alfonso Valdes, Martin Fong

Email archive analysis through graphical visualization – Wei-Jen Li, Shlomo Hershkop, Salvatore J. Stolfo

NVisionCC: a visualization framework for high performance cluster security – William Yurcik, Xin Meng, Nadir Kiyanclar

Statistical profiling and visualization for detection of malicious insider attacks on computer networks – Jeffrey B. Colombe, Gregory Stephens

SnortView: visualization system of snort logs – Hideki Koike, Kazuhiro Ohno

End of List

  • For a full list of all the articles in Tek Eye see the full site Index.

Author:  Published:  Updated:  

ShareSubmit to TwitterSubmit to FacebookSubmit to LinkedInSubmit to redditPrint Page

Do you have a question or comment about this article?

(Alternatively, use the email address at the bottom of the web page.)

 This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

markdown CMS Small Logo Icon ↓markdown↓ CMS is fast and simple. Build websites quickly and publish easily. For beginner to expert.

Articles on:

Android Programming and Android Practice Projects, HTML, VPS, Computing, IT, Computer History, ↓markdown↓ CMS, C# Programming, Using Windows for Programming

Free Android Projects and Samples:

Android Examples, Android List Examples, Android UI Examples

Tek Eye Published Projects