Proceedings of the 11th annual Cyber and Information Security Research Conference / / general chairs, Joseph P. Trien, Stacy J. Prowell, John R. Goodall |
Pubbl/distr/stampa | New York : , : ACM, , 2016 |
Descrizione fisica | 1 online resource (150 pages) |
Disciplina | 005.8 |
Soggetto topico |
Cyber intelligence (Computer security)
Cyberspace - Security measures Computer networks - Security measures |
ISBN | 1-4503-3752-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti |
CISRC '16 : 11th annual Cyber and Information Security Research : Oak Ridge, TN, USA, April 05-07, 2016
Cyber and Information Security Research '16 |
Record Nr. | UNINA-9910376161503321 |
New York : , : ACM, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Visualization for computer security : 5th international workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008 : proceedings / / John R. Goodall, Gregory Conti and Kwan-Liu Ma (eds.) |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin, Germany ; ; New York, New York : , : Springer, , [2008] |
Descrizione fisica | 1 online resource (VIII, 197 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Visualization - Data processing |
ISBN | 3-540-85933-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Visual Reverse Engineering of Binary and Data Files -- Effective Visualization of File System Access-Control -- Visual Analysis of Program Flow Data with Data Propagation -- A Term Distribution Visualization Approach to Digital Forensic String Search -- GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool -- A Graph-Theoretic Visualization Approach to Network Risk Analysis -- Improving Attack Graph Visualization through Data Reduction and Attack Grouping -- Show Me How You See: Lessons from Studying Computer Forensics Experts for Visualization -- A Task Centered Framework for Computer Security Data Visualization -- BGPeep: An IP-Space Centered View for Internet Routing Data -- Large-Scale Network Monitoring for Visual Analysis of Attacks -- Visualizing Real-Time Network Resource Usage -- Wireless Cyber Assets Discovery Visualization -- NetFlow Data Visualization Based on Graphs -- Backhoe, a Packet Trace and Log Browser -- Existence Plots: A Low-Resolution Time Series for Port Behavior Analysis -- Using Time Series 3D AlertGraph and False Alert Classification to Analyse Snort Alerts -- Network Traffic Exploration Application: A Tool to Assess, Visualize, and Analyze Network Security Events. |
Record Nr. | UNINA-9910483062203321 |
Berlin, Germany ; ; New York, New York : , : Springer, , [2008] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Visualization for computer security : 5th international workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008 : proceedings / / John R. Goodall, Gregory Conti and Kwan-Liu Ma (eds.) |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin, Germany ; ; New York, New York : , : Springer, , [2008] |
Descrizione fisica | 1 online resource (VIII, 197 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Visualization - Data processing |
ISBN | 3-540-85933-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Visual Reverse Engineering of Binary and Data Files -- Effective Visualization of File System Access-Control -- Visual Analysis of Program Flow Data with Data Propagation -- A Term Distribution Visualization Approach to Digital Forensic String Search -- GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool -- A Graph-Theoretic Visualization Approach to Network Risk Analysis -- Improving Attack Graph Visualization through Data Reduction and Attack Grouping -- Show Me How You See: Lessons from Studying Computer Forensics Experts for Visualization -- A Task Centered Framework for Computer Security Data Visualization -- BGPeep: An IP-Space Centered View for Internet Routing Data -- Large-Scale Network Monitoring for Visual Analysis of Attacks -- Visualizing Real-Time Network Resource Usage -- Wireless Cyber Assets Discovery Visualization -- NetFlow Data Visualization Based on Graphs -- Backhoe, a Packet Trace and Log Browser -- Existence Plots: A Low-Resolution Time Series for Port Behavior Analysis -- Using Time Series 3D AlertGraph and False Alert Classification to Analyse Snort Alerts -- Network Traffic Exploration Application: A Tool to Assess, Visualize, and Analyze Network Security Events. |
Record Nr. | UNISA-996465282903316 |
Berlin, Germany ; ; New York, New York : , : Springer, , [2008] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|