G Conti, E Dean, M Sinda, B Sangster - International Workshop on …, 2008 - Springer
The analysis of computer files poses a difficult problem for security researchers seeking to detect and analyze malicious content, software developers stress testing file formats for their …
AD D'Amico, JR Goodall, DR Tesone… - IEEE Computer …, 2007 - ieeexplore.ieee.org
Computer network defense (CND) requires analysts to detect both known and novel forms of attacks in massive volumes of network data. It's through discovering the unexpected that …
BCM Cappers, PN Meessen, S Etalle… - … IEEE symposium on …, 2018 - ieeexplore.ieee.org
Forensic analysis of malware activity in network environments is a necessary yet very costly and time consuming part of incident response. Vast amounts of data need to be screened, in …
Information visualization is an effective way to easily comprehend large amounts of data. For such systems to be truly effective, the information visualization designer must be aware of …
L Hao, CG Healey… - 2015 IEEE Symposium on …, 2015 - ieeexplore.ieee.org
Network security analysis and ensemble data visualization are two active research areas. Although they are treated as separate domains, they share many common challenges and …
E Bertini, P Hertzog, D Lalanne - 2007 IEEE symposium on …, 2007 - ieeexplore.ieee.org
This article presents SpiralView, a visualization tool for helping system administrators to assess network policies. The tool is meant to be a complementary support to the routine …
JR Goodall - VizSEC 2007: Proceedings of the Workshop on …, 2008 - Springer
Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. Automated systems to combat this threat are one potential solution, but most automated …
Most network traffic analysis applications are designed to discover malicious activity by only relying on high-level flow-based message properties. However, to detect security breaches …
This article presents a framework for designing network security visualization systems as well as results from the end-to-end design and implementation of two highly interactive …