Default Cover Image

2016 IEEE Symposium on Visualization for Cyber Security (VizSec)

Oct. 24 2016 to Oct. 24 2016

Baltimore, MD, USA

Table of Contents

[Title page]Freely available from IEEE.pp. 1-1
[Copyright notice]Freely available from IEEE.pp. 1-1
ForewordFreely available from IEEE.pp. iii-iii
CommitteesFreely available from IEEE.pp. iv-iv
Table of ContentsFreely available from IEEE.pp. v-v
J-Viz: Finding algorithmic complexity attacks via graph visualization of Java bytecodeFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Cesar: Visual representation of source code vulnerabilitiesFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Visualization of actionable knowledge to mitigate DRDoS attacksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Understanding the context of network traffic alertsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
V3SPA: A visual analysis, exploration, and diffing tool for SELinux and SEAndroid security policiesFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Uncovering periodic network signals of cyber attacksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Detecting malicious logins in enterprise networks using visualizationFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Bigfoot: A geo-based visualization methodology for detecting BGP threatsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
CyberPetri at CDX 2016: Real-time network situation awarenessFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Visualizing a Malware Distribution NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Visually guided flow tracking in software-defined networkingFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Showing 17 out of 17