The Community for Technology Leaders
2016 IEEE Symposium on Visualization for Cyber Security (VizSec) (2016)
Baltimore, MD, USA
Oct. 24, 2016 to Oct. 24, 2016
ISBN: 978-1-5090-1606-8
TABLE OF CONTENTS

[Title page] (PDF)

pp. 1

Foreword (PDF)

pp. iii

Committees (PDF)

pp. iv

J-Viz: Finding algorithmic complexity attacks via graph visualization of Java bytecode (Abstract)

Md. Jawaherul Alam , Dept. of Computer Science, University of California, Irvine, CA USA
Michael T. Goodrich , Dept. of Computer Science, University of California, Irvine, CA USA
Timothy Johnson , Dept. of Computer Science, University of California, Irvine, CA USA
pp. 1-8

Cesar: Visual representation of source code vulnerabilities (Abstract)

Hala Assal , School of Computer Science, Carleton University
Sonia Chiasson , School of Computer Science, Carleton University
Robert Biddle , School of Computer Science, Carleton University
pp. 1-8

Visualization of actionable knowledge to mitigate DRDoS attacks (Abstract)

Michael Aupetit , Qatar Computing Research Institute, HBKU
Yury Zhauniarovich , Qatar Computing Research Institute, HBKU
Giorgos Vasiliadis , Qatar Computing Research Institute, HBKU
Marc Dacier , Qatar Computing Research Institute, HBKU
Yazan Boshmaf , Qatar Computing Research Institute, HBKU
pp. 1-8

Understanding the context of network traffic alerts (Abstract)

Bram C. M. Cappers , Department of Mathematics and Computer Science, Eindhoven University of Technology, The Netherlands
Jarke J. van Wijk , Department of Mathematics and Computer Science, Eindhoven University of Technology, The Netherlands
pp. 1-8

Uncovering periodic network signals of cyber attacks (Abstract)

Ngoc Anh Huynh , Nanyang Technological University, Singapore
Wee Keong Ng , Nanyang Technological University, Singapore
Alex Ulmer , Fraunhofer IGD, Germany
Jorn Kohlhammer , Fraunhofer IGD, Germany
pp. 1-8

Detecting malicious logins in enterprise networks using visualization (Abstract)

Hossein Siadati , New York University
Bahador Saket , Georgia Institute of Technology
Nasir Memon , New York University
pp. 1-8

Bigfoot: A geo-based visualization methodology for detecting BGP threats (Abstract)

Meenakshi Syamkumar , University of Wisconsin - Madison
Ramakrishnan Durairajan , University of Wisconsin - Madison
Paul Barford , University of Wisconsin - Madison and comScore, Inc.
pp. 1-8

CyberPetri at CDX 2016: Real-time network situation awareness (Abstract)

Dustin Arendt , Pacific Northwest National Laboratory
Dan Best , Pacific Northwest National Laboratory
Russ Burtner , Pacific Northwest National Laboratory
Celeste Lyn Paul , Department of Defense
pp. 1-4

Visualizing a Malware Distribution Network (Abstract)

Sebastian Peryt , Cylab-CIT and SCS Carnegie Mellon Univ.
Jose Andre Morales , SEI-CERT Carnegie Mellon Univ.
William Casey , SEI-CERT Carnegie Mellon Univ.
Aaron Volkmann , SEI-CERT Carnegie Mellon Univ.
Bud Mishra , Courant Institute New York Univ.
Yang Cai , Cylab-CIT and SCS Carnegie Mellon Univ.
pp. 1-4

Visually guided flow tracking in software-defined networking (Abstract)

Tobias Post , University of Kaiserslautern
Thomas Wischgoll , Wright State University
Adam R. Bryant , Wright State University
Bernd Hamann , University of California (UC Davis)
Paul Muller , University of Kaiserslautern
Hans Hagen , University of Kaiserslautern
pp. 1-4
90 ms
(Ver 3.3 (11022016))