Cargando…

VizSEC 2007 Proceedings of the Workshop on Visualization for Computer Security /

Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber threat is to provide security analysts with better tools to discover patterns, detect anomalies, identify correlations, and communicate their findings. Visualization for computer...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Goodall, John R. (Editor ), Conti, Gregory (Editor ), Ma, Kwan-Liu (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2008.
Edición:1st ed. 2008.
Colección:Mathematics and Visualization,
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-540-78243-8
003 DE-He213
005 20220118232426.0
007 cr nn 008mamaa
008 100301s2008 gw | s |||| 0|eng d
020 |a 9783540782438  |9 978-3-540-78243-8 
024 7 |a 10.1007/978-3-540-78243-8  |2 doi 
050 4 |a TA1501-1820 
050 4 |a TA1634 
072 7 |a UYT  |2 bicssc 
072 7 |a COM016000  |2 bisacsh 
072 7 |a UYT  |2 thema 
082 0 4 |a 006  |2 23 
245 1 0 |a VizSEC 2007  |h [electronic resource] :  |b Proceedings of the Workshop on Visualization for Computer Security /  |c edited by John R. Goodall, Gregory Conti, Kwan-Liu Ma. 
250 |a 1st ed. 2008. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2008. 
300 |a XV, 273 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Mathematics and Visualization,  |x 2197-666X 
505 0 |a to Visualization for Computer Security -- The Real Work of Computer Network Defense Analysts -- Adapting Personas for Use in Security Visualization Design -- Measuring the Complexity of Computer Security Visualization Designs -- Integrated Environment Management for Information Operations Testbeds -- Visual Analysis of Network Flow Data with Timelines and Event Plots -- NetBytes Viewer: An Entity-Based NetFlow Visualization Utility for Identifying Intrusive Behavior -- Visual Analysis of Corporate Network Intelligence: Abstracting and Reasoning on Yesterdays for Acting Today -- Visualizing Network Security Events Using Compound Glyphs from a Service-Oriented Perspective -- High Level Internet Scale Traffic Visualization Using Hilbert Curve Mapping -- VisAlert: From Idea to Product -- Visually Understanding Jam Resistant Communication -- Visualization of Host Behavior for Network Security -- Putting Security in Context: Visual Correlation of Network Activity with Real-World Information -- An Interactive Attack Graph Cascade and Reachability Display -- Intelligent Classification and Visualization of Network Scans -- Using InetVis to Evaluate Snort and Bro Scan Detection on a Network Telescope. 
520 |a Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber threat is to provide security analysts with better tools to discover patterns, detect anomalies, identify correlations, and communicate their findings. Visualization for computer security (VizSec) researchers and developers are doing just that. VizSec is about putting robust information visualization tools into the hands of human analysts to take advantage of the power of the human perceptual and cognitive processes in solving computer security problems. This volume collects the papers presented at the 4th International Workshop on Computer Security - VizSec 2007. 
650 0 |a Image processing-Digital techniques. 
650 0 |a Computer vision. 
650 0 |a Information visualization. 
650 0 |a Data structures (Computer science). 
650 0 |a Information theory. 
650 0 |a Computers-Law and legislation. 
650 0 |a Information technology-Law and legislation. 
650 0 |a Computer science-Mathematics. 
650 1 4 |a Computer Imaging, Vision, Pattern Recognition and Graphics. 
650 2 4 |a Data and Information Visualization. 
650 2 4 |a Data Structures and Information Theory. 
650 2 4 |a Legal Aspects of Computing. 
650 2 4 |a Mathematical Applications in Computer Science. 
700 1 |a Goodall, John R.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Conti, Gregory.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Ma, Kwan-Liu.  |e editor.  |0 (orcid)0000-0001-8086-0366  |1 https://orcid.org/0000-0001-8086-0366  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783642096884 
776 0 8 |i Printed edition:  |z 9783540849063 
776 0 8 |i Printed edition:  |z 9783540782421 
830 0 |a Mathematics and Visualization,  |x 2197-666X 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-540-78243-8  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)