Buch, Englisch, 197 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 324 g
Reihe: Security and Cryptology
5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008, Proceedings
Buch, Englisch, 197 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 324 g
Reihe: Security and Cryptology
ISBN: 978-3-540-85931-4
Verlag: Springer Berlin Heidelberg
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Technische Informatik Netzwerk-Hardware
- Mathematik | Informatik EDV | Informatik Professionelle Anwendung Digitale Animation
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Data Mining
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Algorithmen & Datenstrukturen
- Mathematik | Informatik Mathematik Operations Research Graphentheorie
Weitere Infos & Material
Visual Reverse Engineering of Binary and Data Files.- Effective Visualization of File System Access-Control.- Visual Analysis of Program Flow Data with Data Propagation.- A Term Distribution Visualization Approach to Digital Forensic String Search.- GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool.- A Graph-Theoretic Visualization Approach to Network Risk Analysis.- Improving Attack Graph Visualization through Data Reduction and Attack Grouping.- Show Me How You See: Lessons from Studying Computer Forensics Experts for Visualization.- A Task Centered Framework for Computer Security Data Visualization.- BGPeep: An IP-Space Centered View for Internet Routing Data.- Large-Scale Network Monitoring for Visual Analysis of Attacks.- Visualizing Real-Time Network Resource Usage.- Wireless Cyber Assets Discovery Visualization.- NetFlow Data Visualization Based on Graphs.- Backhoe, a Packet Trace and Log Browser.- Existence Plots: A Low-Resolution Time Series for Port Behavior Analysis.- Using Time Series 3D AlertGraph and False Alert Classification to Analyse Snort Alerts.- Network Traffic Exploration Application: A Tool to Assess, Visualize, and Analyze Network Security Events.