Visualization for computer security : 5th international workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008 : proceedings / / John R. Goodall, Gregory Conti and Kwan-Liu Ma (eds.) |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin, Germany ; ; New York, New York : , : Springer, , [2008] |
Descrizione fisica | 1 online resource (VIII, 197 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Visualization - Data processing |
ISBN | 3-540-85933-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Visual Reverse Engineering of Binary and Data Files -- Effective Visualization of File System Access-Control -- Visual Analysis of Program Flow Data with Data Propagation -- A Term Distribution Visualization Approach to Digital Forensic String Search -- GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool -- A Graph-Theoretic Visualization Approach to Network Risk Analysis -- Improving Attack Graph Visualization through Data Reduction and Attack Grouping -- Show Me How You See: Lessons from Studying Computer Forensics Experts for Visualization -- A Task Centered Framework for Computer Security Data Visualization -- BGPeep: An IP-Space Centered View for Internet Routing Data -- Large-Scale Network Monitoring for Visual Analysis of Attacks -- Visualizing Real-Time Network Resource Usage -- Wireless Cyber Assets Discovery Visualization -- NetFlow Data Visualization Based on Graphs -- Backhoe, a Packet Trace and Log Browser -- Existence Plots: A Low-Resolution Time Series for Port Behavior Analysis -- Using Time Series 3D AlertGraph and False Alert Classification to Analyse Snort Alerts -- Network Traffic Exploration Application: A Tool to Assess, Visualize, and Analyze Network Security Events. |
Record Nr. | UNINA-9910483062203321 |
Berlin, Germany ; ; New York, New York : , : Springer, , [2008] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Visualization for computer security : 5th international workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008 : proceedings / / John R. Goodall, Gregory Conti and Kwan-Liu Ma (eds.) |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin, Germany ; ; New York, New York : , : Springer, , [2008] |
Descrizione fisica | 1 online resource (VIII, 197 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Visualization - Data processing |
ISBN | 3-540-85933-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Visual Reverse Engineering of Binary and Data Files -- Effective Visualization of File System Access-Control -- Visual Analysis of Program Flow Data with Data Propagation -- A Term Distribution Visualization Approach to Digital Forensic String Search -- GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool -- A Graph-Theoretic Visualization Approach to Network Risk Analysis -- Improving Attack Graph Visualization through Data Reduction and Attack Grouping -- Show Me How You See: Lessons from Studying Computer Forensics Experts for Visualization -- A Task Centered Framework for Computer Security Data Visualization -- BGPeep: An IP-Space Centered View for Internet Routing Data -- Large-Scale Network Monitoring for Visual Analysis of Attacks -- Visualizing Real-Time Network Resource Usage -- Wireless Cyber Assets Discovery Visualization -- NetFlow Data Visualization Based on Graphs -- Backhoe, a Packet Trace and Log Browser -- Existence Plots: A Low-Resolution Time Series for Port Behavior Analysis -- Using Time Series 3D AlertGraph and False Alert Classification to Analyse Snort Alerts -- Network Traffic Exploration Application: A Tool to Assess, Visualize, and Analyze Network Security Events. |
Record Nr. | UNISA-996465282903316 |
Berlin, Germany ; ; New York, New York : , : Springer, , [2008] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|