Sciweavers

VIZSEC
2007
Springer
13 years 10 months ago
An Interactive Attack Graph Cascade and Reachability Display
Abstract Attack graphs for large enterprise networks improve security by revealing critical paths used by adversaries to capture network assets. Even with simplification, current a...
Leevar Williams, Richard Lippmann, Kyle Ingols
VIZSEC
2007
Springer
13 years 10 months ago
Visual Analysis of Network Flow Data with Timelines and Event Plots
This paper describes Isis, a system that uses progressive multiples of timelines and event plots to support the iterative investigation of intrusions by experienced analysts using ...
Doantam Phan, J. Gerth, M. Lee, Andreas Paepcke, T...
VIZSEC
2007
Springer
13 years 10 months ago
Visually Understanding Jam Resistant Communication
Dino Schweitzer, L. Baird, W. Bahn
VIZSEC
2007
Springer
13 years 10 months ago
Visualizing Network Security Events Using Compound Glyphs from a Service-Oriented Perspective
ct Network security is the complicated field of controlling access within a computer network. One of the difficulties in network security is detecting the presence, severity, and ...
Jason Pearlman, Penny Rheingans
VIZSEC
2007
Springer
13 years 10 months ago
Integrated Environment Management for Information Operations Testbeds
T. H. Yu, B. W. Fuller, J. H. Bannick, L. M. Rosse...
VIZSEC
2007
Springer
13 years 10 months ago
Visualization of Host Behavior for Network Security
Monitoring host behavior in a network is one of the most essential tasks in the fields of network monitoring and security since more and more malicious code in the wild internet c...
F. Mansman, L. Meier, Daniel A. Keim