Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
VIZSEC
VIZSEC 2016
Generate Citations
2016 IEEE Symposium on Visualization for Cyber Security (VizSec)
Oct. 24 2016 to Oct. 24 2016
Baltimore, MD, USA
Table of Contents
[Title page]
Freely available from IEEE.
pp. 1-1
[Copyright notice]
Freely available from IEEE.
pp. 1-1
Foreword
Freely available from IEEE.
pp. iii-iii
Committees
Freely available from IEEE.
pp. iv-iv
Table of Contents
Freely available from IEEE.
pp. v-v
J-Viz: Finding algorithmic complexity attacks via graph visualization of Java bytecode
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Md. Jawaherul Alam
,
Michael T. Goodrich
,
Timothy Johnson
Cesar: Visual representation of source code vulnerabilities
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Hala Assal
,
Sonia Chiasson
,
Robert Biddle
Visualization of actionable knowledge to mitigate DRDoS attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Michael Aupetit
,
Yury Zhauniarovich
,
Giorgos Vasiliadis
,
Marc Dacier
,
Yazan Boshmaf
Mixed method approach to identify analytic questions to be visualized for military cyber incident handlers
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Laurin Buchanan
,
Anita D'Amico
,
Drew Kirkpatrick
Understanding the context of network traffic alerts
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Bram C. M. Cappers
,
Jarke J. van Wijk
V3SPA: A visual analysis, exploration, and diffing tool for SELinux and SEAndroid security policies
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Robert Gove
Uncovering periodic network signals of cyber attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Ngoc Anh Huynh
,
Wee Keong Ng
,
Alex Ulmer
,
Jörn Kohlhammer
Detecting malicious logins in enterprise networks using visualization
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Hossein Siadati
,
Bahador Saket
,
Nasir Memon
Bigfoot: A geo-based visualization methodology for detecting BGP threats
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Meenakshi Syamkumar
,
Ramakrishnan Durairajan
,
Paul Barford
CyberPetri at CDX 2016: Real-time network situation awareness
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Dustin Arendt
,
Dan Best
,
Russ Burtner
,
Celeste Lyn Paul
Visualizing a Malware Distribution Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Sebastian Peryt
,
Jose Andre Morales
,
William Casey
,
Aaron Volkmann
,
Bud Mishra
,
Yang Cai
Visually guided flow tracking in software-defined networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Tobias Post
,
Thomas Wischgoll
,
Adam R. Bryant
,
Bernd Hamann
,
Paul Müller
,
Hans Hagen
Showing 17 out of 17