Large-Scale Network Monitoring for Visual Analysis of Attacks (English)
- New search for: Fischer, Fabian
- New search for: Mansmann, Florian
- New search for: Keim, Daniel A.
- New search for: Pietzko, Stephan
- New search for: Waldvogel, Marcel
- New search for: Goodall, John R.
- New search for: Conti, Gregory
- New search for: Ma, Kwan-Liu
- Further information on Ma, Kwan-Liu:
- https://orcid.org/https://orcid.org/0000-0001-8086-0366
- New search for: Fischer, Fabian
- New search for: Mansmann, Florian
- New search for: Keim, Daniel A.
- New search for: Pietzko, Stephan
- New search for: Waldvogel, Marcel
In:
Visualization for Computer Security
: 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings
;
Chapter: 11
;
111-118
;
2008
- Article/Chapter (Book) / Electronic Resource
-
Title:Large-Scale Network Monitoring for Visual Analysis of Attacks
-
Contributors:Goodall, John R. ( editor ) / Conti, Gregory ( editor ) / Ma, Kwan-Liu ( editor ) / Fischer, Fabian ( author ) / Mansmann, Florian ( author ) / Keim, Daniel A. ( author ) / Pietzko, Stephan ( author ) / Waldvogel, Marcel ( author )
-
Conference:International Workshop on Visualization for Computer Security ; 2008 ; Cambridge, USA
-
Published in:Visualization for Computer Security : 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings ; Chapter: 11 ; 111-118Lecture Notes in Computer Science ; 5210 ; 111-118
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2008-01-01
-
Size:8 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Visual Reverse Engineering of Binary and Data FilesConti, Gregory / Dean, Erik / Sinda, Matthew / Sangster, Benjamin et al. | 2008
- 2
-
Effective Visualization of File System Access-ControlHeitzmann, Alexander / Palazzi, Bernardo / Papamanthou, Charalampos / Tamassia, Roberto et al. | 2008
- 26
-
Visual Analysis of Program Flow Data with Data PropagationXia, Ying / Fairbanks, Kevin / Owen, Henry et al. | 2008
- 4
-
A Term Distribution Visualization Approach to Digital Forensic String SearchSchwartz, Moses / Liebrock, L. M. et al. | 2008
- 44
-
GARNET: A Graphical Attack Graph and Reachability Network Evaluation ToolWilliams, Leevar / Lippmann, Richard / Ingols, Kyle et al. | 2008
- 6
-
A Graph-Theoretic Visualization Approach to Network Risk AnalysisO’Hare, Scott / Noel, Steven / Prole, Kenneth et al. | 2008
- 7
-
Improving Attack Graph Visualization through Data Reduction and Attack GroupingHomer, John / Varikuti, Ashok / Ou, Xinming / McQueen, Miles A. et al. | 2008
- 80
-
Show Me How You See: Lessons from Studying Computer Forensics Experts for VisualizationJankun-Kelly, T. J. / Franck, Josh / Wilson, David / Carver, Jeffery / Dampier, David / Swan, J. Edward II et al. | 2008
- 87
-
A Task Centered Framework for Computer Security Data VisualizationSuo, Xiaoyuan / Zhu, Ying / Owen, Scott et al. | 2008
- 95
-
BGPeep: An IP-Space Centered View for Internet Routing DataShearer, James / Ma, Kwan-Liu / Kohlenberg, Toby et al. | 2008
- 11
-
Large-Scale Network Monitoring for Visual Analysis of AttacksFischer, Fabian / Mansmann, Florian / Keim, Daniel A. / Pietzko, Stephan / Waldvogel, Marcel et al. | 2008
- 119
-
Visualizing Real-Time Network Resource UsageBlue, Ryan / Dunne, Cody / Fuchs, Adam / King, Kyle / Schulman, Aaron et al. | 2008
- 136
-
Wireless Cyber Assets Discovery VisualizationProle, Kenneth / Goodall, John R. / D’Amico, Anita D. / Kopylec, Jason K. et al. | 2008
- 14
-
NetFlow Data Visualization Based on GraphsMinarik, Pavel / Dymacek, Tomas et al. | 2008
- 15
-
Backhoe, a Packet Trace and Log BrowserBratus, Sergey / Hansen, Axel / Pellacini, Fabio / Shubina, Anna et al. | 2008
- 161
-
Existence Plots: A Low-Resolution Time Series for Port Behavior AnalysisJanies, Jeff et al. | 2008
- 169
-
Using Time Series 3D AlertGraph and False Alert Classification to Analyse Snort AlertsMusa, Shahrulniza / Parish, David J. et al. | 2008
- 181
-
Network Traffic Exploration Application: A Tool to Assess, Visualize, and Analyze Network Security EventsVandenberghe, Grant et al. | 2008