The Community for Technology Leaders
IEEE Workshop on Visualization for Computer Security 2005 (VizSEC 05) (2005)
Minneapolis, MN, USA
Oct. 26, 2005 to Oct. 26, 2005
ISBN: 0-7803-9477-1
TABLE OF CONTENTS

Visual correlation of host processes and network traffic (PDF)

G.A. Fink , Virginia Polytech. Inst. & State Univ., USA
P. Muessig , Virginia Polytech. Inst. & State Univ., USA
C. North , Virginia Polytech. Inst. & State Univ., USA
pp. 11,12,13,14,15,16,17,18,19

A user-centered look at glyph-based security visualization (PDF)

A. Komlodi , Maryland Univ. Baltimore County, USA
P. Rheingans , Maryland Univ. Baltimore County, USA
Utkarsha Ayachit , Maryland Univ. Baltimore County, USA
J.R. Goodall , Maryland Univ. Baltimore County, USA
Amit Joshi , Maryland Univ. Baltimore County, USA
pp. 21,22,23,24,25,26,27,28

A visualization methodology for characterization of network scans (Abstract)

C. Muelder , California Univ. Davis, USA
Kwan-Liu Ma , California Univ. Davis, USA
pp. 29-38

Preserving the big picture: visual network traffic analysis with TNV (PDF)

J.R. Goodall , Maryland Univ. , Baltimore County, USA
W.G. Lutters , Maryland Univ. , Baltimore County, USA
P. Rheingans , Maryland Univ. , Baltimore County, USA
A. Komlodi , Maryland Univ. , Baltimore County, USA
pp. 47,48,49,50,51,52,53,54

Root polar layout of Internet address data for security administration (PDF)

G.A. Fink , Virginia Polytech. Inst. & State Univ., USA
C. North , Virginia Polytech. Inst. & State Univ., USA
pp. 55,56,57,58,59,60,61,62,63,64

Visual exploration of malicious network objects using semantic zoom, interactive encoding and dynamic queries (PDF)

G. Conti , Georgia Inst. of Technol., USA
J. Grizzard , Georgia Inst. of Technol., USA
Mustaque Ahamad , Georgia Inst. of Technol., USA
H. Owen , Georgia Inst. of Technol., USA
pp. 83,84,85,86,87,88,89,90

Multiple coordinated views for network attack graphs (PDF)

S. Noel , Center for Secure Inf. Syst., George Mason Univ., Fairfax, VA, USA
M. Jacobs , Center for Secure Inf. Syst., George Mason Univ., Fairfax, VA, USA
Pramod Kalapa , Center for Secure Inf. Syst., George Mason Univ., Fairfax, VA, USA
Sushil Jajodia , Center for Secure Inf. Syst., George Mason Univ., Fairfax, VA, USA
pp. 99,100,101,102,103,104,105,106

Information assurance visualizations for specific stages of situational awareness and intended uses: lessons learned (PDF)

A. D'Amico , Secure Decisions, Appl. Visions, Inc., Northport, NY, USA
M. Kocka , Secure Decisions, Appl. Visions, Inc., Northport, NY, USA
pp. 107,108,109,110,111,112

Exploring three-dimensional visualization for intrusion detection (PDF)

A. Oline , Dept. of Comput. Sci., Iowa State Univ., USA
D. Reiners , Dept. of Comput. Sci., Iowa State Univ., USA
pp. 113,114,115,116,117,118,119,120

Designing visualization capabilities for IDS challenges (PDF)

R.F. Erbacher , Dept. of CS, Utah State Univ., Logan, UT, USA
K. Christensen , Dept. of CS, Utah State Univ., Logan, UT, USA
A. Sundberg , Dept. of CS, Utah State Univ., Logan, UT, USA
pp. 121,122,123,124,125,126,127

Visual firewall: real-time network security monitor (PDF)

C.P. Lee , CSC, Georgia Tech, USA
pp. 129,130,131,132,133,134,135,136
88 ms
(Ver 3.3 (11022016))