VIZSEC
14 years 3 months ago
2004 Springer
The number of attacks against large computer systems is currently growing at a rapid pace. Despite the best efforts of security analysts, large organizations are having trouble k...
VIZSEC
14 years 3 months ago
2004 Springer
This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attack...
VIZSEC
14 years 3 months ago
2004 Springer
We describe a framework for managing network attack graph complexity through interactive visualization, which includes hierarchical aggregation of graph elements. Aggregation coll...
VIZSEC
14 years 3 months ago
2004 Springer
This paper concentrates on visualizing computer viruses without using virus specific signature information as a prior stage of the very important problem of detecting computer vi...
VIZSEC
14 years 3 months ago
2004 Springer
Most visualizations of security-related network data require large amounts of finely detailed, high-dimensional data. However, in some cases, the data available can only be coars...
|