Skip to main content
  • Conference proceedings
  • © 2008

VizSEC 2007

Proceedings of the Workshop on Visualization for Computer Security

Part of the book series: Mathematics and Visualization (MATHVISUAL)

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (17 papers)

  1. Front Matter

    Pages i-xv
  2. The Real Work of Computer Network Defense Analysts

    • A. D’Amico, K. Whitley
    Pages 19-37
  3. Adapting Personas for Use in Security Visualization Design

    • J. Stoll, D. McColgin, M. Gregory, V. Crow, W. K. Edwards
    Pages 39-52
  4. Integrated Environment Management for Information Operations Testbeds

    • T. H. Yu, B. W. Fuller, J. H. Bannick, L. M. Rossey, R. K. Cunningham
    Pages 67-83
  5. Visual Analysis of Network Flow Data with Timelines and Event Plots

    • D. Phan, J. Gerth, M. Lee, A. Paepcke, T. Winograd
    Pages 85-99
  6. VisAlert: From Idea to Product

    • S. Foresti, J. Agutter
    Pages 159-174
  7. Visually Understanding Jam Resistant Communication

    • D. Schweitzer, L. Baird, W. Bahn
    Pages 175-186
  8. Visualization of Host Behavior for Network Security

    • F. Mansman, L. Meier, D. A. Keim
    Pages 187-202
  9. An Interactive Attack Graph Cascade and Reachability Display

    • L. Williams, R. Lippmann, K. Ingols
    Pages 221-236
  10. Intelligent Classification and Visualization of Network Scans

    • C. Muelder, L. Chen, R. Thomason, K. -L. Ma, T. Bartoletti
    Pages 237-253

About this book

Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber threat is to provide security analysts with better tools to discover patterns, detect anomalies, identify correlations, and communicate their findings. Visualization for computer security (VizSec) researchers and developers are doing just that. VizSec is about putting robust information visualization tools into the hands of human analysts to take advantage of the power of the human perceptual and cognitive processes in solving computer security problems. This volume collects the papers presented at the 4th International Workshop on Computer Security - VizSec 2007.

Reviews

From the reviews:

"This book is a collection of several very useful contributions. The introductory paper by the editors is quite useful as an overview of the field, and could very well be recommended reading for a course. … I recommend this book to anyone who is involved in, or wants to get up to speed with the use of, visualization techniques in computer security." (Stefano Zanero, ACM Computing Reviews, October, 2008)

Editors and Affiliations

  • Secure Decisions Division, Applied Vision, Inc., Northport, USA

    John R. Goodall

  • Department of Electrical Engineering and Computer Science, United States Military Academy, West Point, USA

    Gregory Conti

  • Department of Computer Science, University of California, Davis, USA

    Kwan-Liu Ma

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access