VIZSEC
14 years 3 months ago
2004 Springer
The number of attacks against large computer systems is currently growing at a rapid pace. Despite the best efforts of security analysts, large organizations are having trouble k...
VIZSEC
14 years 3 months ago
2004 Springer
Most visualizations of security-related network data require large amounts of finely detailed, high-dimensional data. However, in some cases, the data available can only be coars...
VIZSEC
14 years 3 months ago
2004 Springer
We describe a framework for managing network attack graph complexity through interactive visualization, which includes hierarchical aggregation of graph elements. Aggregation coll...
VIZSEC
14 years 3 months ago
2004 Springer
The analysis of the vast storehouse of email content accumulated or produced by individual users has received relatively little attention other than for specific tasks such as spa...
VIZSEC
14 years 3 months ago
2004 Springer
This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attack...
|