发芽 发表于 2025-3-25 04:18:11

GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool,etwork assets. This paper presents GARNET (Graphical Attack graph and Reachability Network Evaluation Tool), an interactive visualization tool that facilitates attack graph analysis. It provides a simplified view of critical steps that can be taken by an attacker and of host-to-host network reachabi

Pathogen 发表于 2025-3-25 08:43:19

http://reply.papertrans.cn/99/9839/983849/983849_22.png

垄断 发表于 2025-3-25 14:59:04

Improving Attack Graph Visualization through Data Reduction and Attack Grouping,attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand t

谁在削木头 发表于 2025-3-25 17:13:31

Show Me How You See: Lessons from Studying Computer Forensics Experts for Visualization,ion may be beneficial. To this end, we worked with police detectives and other forensics professionals. However, the process of designing and executing such a study with real-world experts has been a non-trivial task. This paper presents our efforts in this area and the lessons learned as guidance f

擦掉 发表于 2025-3-25 20:19:09

A Task Centered Framework for Computer Security Data Visualization,perhaps more effective. To test this hypothesis, we have developed a new framework of visualization and apply it to computer security visualization. This framework provides a new way for users to interact with data set and potentially will provide new insights into how visualization can be better co

必死 发表于 2025-3-26 00:15:43

BGPeep: An IP-Space Centered View for Internet Routing Data,tion renders the network prefixes involved with such traffic using a method that leverages the peculiarities of BGP traffic to gain insight and highlight potential router misconfigurations. BGPeep utilizes a simple interface and several methods of interaction to allow users to quickly focus on the d

发表于 2025-3-26 05:37:50

http://reply.papertrans.cn/99/9839/983849/983849_27.png

躲债 发表于 2025-3-26 08:50:44

Visualizing Real-Time Network Resource Usage,iew, zoom & filter, details on demand—with network graph and treemap visualizations. NetGrok integrates these tools with a shared data store that can read PCAP-formatted network traces, capture traces from a live interface, and filter the data set dynamically by bandwidth, number of connections, and

对待 发表于 2025-3-26 16:33:22

Wireless Cyber Assets Discovery Visualization,y important to information security auditors, penetration testers, and network administrators. We describe a new prototype called MeerCAT (Mobile Cyber Asset Tracks) for visualizing wireless assets, including their location, security attributes, and relationships. This paper highlights our latest it

VEST 发表于 2025-3-26 19:54:38

NetFlow Data Visualization Based on Graphs, on graphs bridges the gap between highly aggregated information visualization represented by charts and too much detailed information represented by the log files. In our visualization method the graph nodes stand for network devices and oriented edges represent communication between these devices.
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Visualization for Computer Security; 5th International Wo John R. Goodall,Gregory Conti,Kwan-Liu Ma Conference proceedings 2008 Springer-Ve