Normal view MARC view ISBD view

VizSEC 2007 [electronic resource] :Proceedings of the Workshop on Visualization for Computer Security / edited by John R. Goodall, Gregory Conti, Kwan-Liu Ma.

by Goodall, John R [editor.]; Conti, Gregory [editor.]; Ma, Kwan-Liu [editor.]; SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Mathematics and Visualization: Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2008.Description: online resource.ISBN: 9783540782438.Subject(s): Computer science | Data structures (Computer science) | Computer vision | Computers -- Law and legislation | Mathematics | Visualization | Computer Science | Computer Imaging, Vision, Pattern Recognition and Graphics | Visualization | Data Structures, Cryptology and Information Theory | Legal Aspects of Computing | Information and Communication, CircuitsDDC classification: 006.6 Online resources: Click here to access online
Contents:
to Visualization for Computer Security -- The Real Work of Computer Network Defense Analysts -- Adapting Personas for Use in Security Visualization Design -- Measuring the Complexity of Computer Security Visualization Designs -- Integrated Environment Management for Information Operations Testbeds -- Visual Analysis of Network Flow Data with Timelines and Event Plots -- NetBytes Viewer: An Entity-Based NetFlow Visualization Utility for Identifying Intrusive Behavior -- Visual Analysis of Corporate Network Intelligence: Abstracting and Reasoning on Yesterdays for Acting Today -- Visualizing Network Security Events Using Compound Glyphs from a Service-Oriented Perspective -- High Level Internet Scale Traffic Visualization Using Hilbert Curve Mapping -- VisAlert: From Idea to Product -- Visually Understanding Jam Resistant Communication -- Visualization of Host Behavior for Network Security -- Putting Security in Context: Visual Correlation of Network Activity with Real-World Information -- An Interactive Attack Graph Cascade and Reachability Display -- Intelligent Classification and Visualization of Network Scans -- Using InetVis to Evaluate Snort and Bro Scan Detection on a Network Telescope.
In: Springer eBooksSummary: Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber threat is to provide security analysts with better tools to discover patterns, detect anomalies, identify correlations, and communicate their findings. Visualization for computer security (VizSec) researchers and developers are doing just that. VizSec is about putting robust information visualization tools into the hands of human analysts to take advantage of the power of the human perceptual and cognitive processes in solving computer security problems. This volume collects the papers presented at the 4th International Workshop on Computer Security - VizSec 2007.
Tags from this library: No tags from this library for this title. Add tag(s)
Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Current location Call number Status Date due Barcode
TA1637-1638 (Browse shelf) Available
TK7882.P3 (Browse shelf) Available
Long Loan MAIN LIBRARY
T385 (Browse shelf) Available

to Visualization for Computer Security -- The Real Work of Computer Network Defense Analysts -- Adapting Personas for Use in Security Visualization Design -- Measuring the Complexity of Computer Security Visualization Designs -- Integrated Environment Management for Information Operations Testbeds -- Visual Analysis of Network Flow Data with Timelines and Event Plots -- NetBytes Viewer: An Entity-Based NetFlow Visualization Utility for Identifying Intrusive Behavior -- Visual Analysis of Corporate Network Intelligence: Abstracting and Reasoning on Yesterdays for Acting Today -- Visualizing Network Security Events Using Compound Glyphs from a Service-Oriented Perspective -- High Level Internet Scale Traffic Visualization Using Hilbert Curve Mapping -- VisAlert: From Idea to Product -- Visually Understanding Jam Resistant Communication -- Visualization of Host Behavior for Network Security -- Putting Security in Context: Visual Correlation of Network Activity with Real-World Information -- An Interactive Attack Graph Cascade and Reachability Display -- Intelligent Classification and Visualization of Network Scans -- Using InetVis to Evaluate Snort and Bro Scan Detection on a Network Telescope.

Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber threat is to provide security analysts with better tools to discover patterns, detect anomalies, identify correlations, and communicate their findings. Visualization for computer security (VizSec) researchers and developers are doing just that. VizSec is about putting robust information visualization tools into the hands of human analysts to take advantage of the power of the human perceptual and cognitive processes in solving computer security problems. This volume collects the papers presented at the 4th International Workshop on Computer Security - VizSec 2007.

There are no comments for this item.

Log in to your account to post a comment.
@ Jomo Kenyatta University Of Agriculture and Technology Library

Powered by Koha