/ November 3, 2006In conjunction with ACM CCS
The 4th International Workshop on Visualization for Cyber Security was held in Washington, DC, USA on November 3, 2006. VizSec brought together researchers and practitioners in information visualization and security to address the specific needs of the cyber security community through new and insightful visualization techniques.
VizSec was held in conjunction with the 13th ACM Computer and Communications Security Conference (CCS).
The proceedings are in the ACM Digital Library.
Papers
- S. Mathew, R. Giomundo, S. Upadhyaya, M. Sudit, A. Stotz
- "Understanding multistage attacks by attack-track based visualization of heterogeneous event streams" paper link
- L. Li, P. Liu, G. Kesidis
- "Visual toolkit for network security experiment specification and data analysis" paper link
- Asaf Shabtai, Denis Klimov, Yuval Shahar, Yuval Elovici
- "An intelligent, interactive tool for exploration and visualization of time-oriented security data" paper link
- Pin Ren, John Kristoff, Bruce Gooch
- "Visualizing DNS traffic" paper link
- Warren Harrop, Grenville Armitage
- "Real-time collaborative network monitoring and control using 3D game engines for representation and interaction" paper link
- Charles V. Wright, Fabian Monrose, Gerald M. Masson
- "Using visual motifs to classify encrypted traffic" paper link
- Weichao Wang, Aidong Lu
- "Visualization assisted detection of sybil attacks in wireless networks" paper link
- Kulsoom Abdullah, John A. Copeland
- "Tool update: high alarm count issues in IDS rainstorm" paper link
- William Yurcik
- "Tool update: visflowconnect-IP with advanced filtering from usability testing" paper link
- William Yurcik
- "Tool update: NVisionIP improvements (difference view, sparklines, and shapes)" paper link
- Pin Ren
- "Ensuring the continuing success of vizsec" paper link
- Jon Oberheide, Manish Karir, Dionysus Blazakis
- "VAST: visualizing autonomous system topology" paper link
- Soon Tee Teoh, Supranamaya Ranjan, Antonio Nucci, Chen-Nee Chuah
- "BGP eye: a new visualization tool for real-time detection and analysis of BGP anomalies" paper link
- Dino Schweitzer, Leemon Baird
- Discovering an RC4 anomaly through visualization" paper link
- Patrick Hertzog
- "Visualizations to improve reactivity towards security incidents inside corporate networks" paper link
- Christopher P. Lee, John A. Copeland
- "Flowtag: a collaborative attack-analysis, reporting, and sharing tool for security researchers" paper link
- Amanda L. Stephano, Dennis P. Groth
- "USEable security: interface design strategies for improving security" paper link
- George Yee
- "Visualization for privacy compliance" paper link
- Erwan Le Malécot, Masayoshi Kohara, Yoshiaki Hori, Kouichi Sakurai
- "Interactively combining 2D and 3D visualization for network traffic monitoring" paper link
- General Chair
- Bill Yurcik,NCSA
- Program Co-Chairs
- Stefan AxelssonChalmers University, Sweden
- Kiran LakkarajuUniversity of Illinois
- Soon Tee TeohSan Jose State University
Program Committee
- Cristina Abad (Escuela Superior Politenica del Litoral, Ecuador)
- Gail-Joon Ahn (University of North Carolina at Charlotte, USA)
- Edward Balas (Indiana University, USA)
- Emilie Barse (Combitech Systems, Sweden)
- Ratna Bearavolu (Altarum, USA)
- Bill Cheswick (Lumeta, USA)
- Greg Conti (US Military Academy at West Point, USA)
- John Copeland (Georgia Tech, USA)
- Stephen Eick (University of Illinois-Chicago & SSS Research, USA)
- Robert Erbacher (Utah State University, USA)
- Cristian Estan (University of Wisconsin at Madison, USA)
- Glen Fink (Virginia Tech, USA)
- Deborah Frincke (Pacific Northwest National Laboratory, USA)
- Carrie Gates (CA Labs, USA)
- Jiawei Han (University of Illinois, USA)
- T. J. Jankun-Kelly (Mississippi State University, USA)
- James Joshi (University of Pittsburgh, USA)
- Hideki Koike (University of Electro-Communications, Japan)
- Paul Krystosek (Lawrence Livermore National Laboratory, USA)
- Vipin Kumar (University of Minnesota, USA)
- Håkan Kvarnström (TeliaSonera Research, Sweden)
- Mohit Lad (University of California at Los Angeles, USA)
- Kwan-Liu Ma (University of California at Davis, USA)
- David Marchette (US Naval Surface Warfare Center, USA)
- John McHugh (Dalhousie University, Canada)
- Steven Noel (George Mason University, USA)
- Chris North (Virginia Tech, USA)
- Stephen North (AT&T Labs, USA)
- A. L. Narasimha Reddy (Texas A&M, USA)
- John S. Quarterman (InternetPerils, USA)
- Pin Ren (Northwestern University, USA)
- Greg Schmidt (Naval Research Laboratory, USA)
- Ben Shneiderman (University of Maryland, USA)
- Paul Stanton (US Military Academy at West Point, USA)
- John Stasko (Georgia Tech, USA)
- Michael Twidale (University of Illinois, USA)
- Alfonso Valdes (SRI, USA)
- Jun Wang (NCSA, USA)
- Edward Wegman (George Mason University, USA)
- Felix Wu (University of California at Davis, USA)
- Xiaoxin Yin (University of Illinois, USA)
- Lixia Zhang (University of California at Los Angeles, USA)