Integrated Environment Management for Information Operations Testbeds
Network testbeds are indispensable for developing and testing information operations (IO) technologies. Lincoln Laboratory has been developing LARIAT to support IO test design, development, and execution with high-fidelity user simulations. As LARIAT beco
- PDF / 6,969,811 Bytes
- 281 Pages / 439.2 x 666 pts Page_size
- 41 Downloads / 222 Views
John R. Goodall Gregory Conti Kwan-Liu Ma Editors
VizSEC 2007 Proceedings of the Workshop on Visualization for Computer Security With 140 Figures, 117 in Color and 5 Tables
ABC
Editors John R. Goodall
Gregory Conti
Secure Decisions Division Applied Vision, Inc. 6 Bayview Ave. Northport NY 11768, USA [email protected]
Department of Electrical Engineering and Computer Science United States Military Academy West Point, NY 10996, USA [email protected]
Kwan-Liu Ma Department of Computer Science University of California One Shields Avenue Davis, CA 95616, USA [email protected]
e-ISBN 978-3-540- 78243-8
ISBN 978-3-540-78242-1 Mathematics and Visualization
ISSN 1612-3786
Library of Congress Control Number: 2008924865 Mathematics Subject Classification (2001): 68-06, 68U05 c 2008 Springer-Verlag Berlin Heidelberg This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilm or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. Cover design: WMX Design GmbH Printed on acid-free paper 9 8 7 6 5 4 3 2 1 springer.com
Preface
This volume is a collection of the papers presented at the 4th International Workshop on Computer Security – VizSec 2007. The workshop was held in conjunction with the IEEE Visualization 2007 Conference and the IEEE InfoVis Conference in Sacramento, California on October 29, 2007. This volume includes an introductory chapter and two chapters from the workshop’s invited speakers: The Real Work of Computer Network Defense Analysts by Anita D’Amico and Kirsten Whitley, and VisAlert: From Idea to Product by Stefano Foresti and Jim Agutter. All other papers were peer-reviewed by the VizSec program committee. January 2008
John R. Goodall
v
Acknowledgements
We thank the VizSec 2007 Sponsor, NSA’s National Information Assurance Research Laboratory (NIARL), and the VizSec committee members: Workshop Chair • John R. Goodall, Secure Decisions division of Applied Visions, Inc. Program Co-Chairs • Kwan-Liu Ma, University of California at Davis • Gregory Conti, United States Military Academy Program Committee • • • • • • • • • • • • • • • • •
Kulsoom Abdullah, Georgia Institute of Technology Jim Agutter, University of Utah Stefan Axelsson, Blekinge Institute of Technology Anita D’Amico, Secure Decisions Glenn Fink, Pacific Northwest National Laboratory Deborah Frinck
Data Loading...