-
1
-
-
33645218144
-
Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries
-
VizSEC, October
-
Conti, G., Grizzard, J., Ahamad, M., Owen, H.: Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries. In: IEEE Symposium on Information Visualization's Workshop on Visualization for Computer Security (VizSEC) (October 2005)
-
(2005)
IEEE Symposium on Information Visualization's Workshop on Visualization for Computer Security
-
-
Conti, G.1
Grizzard, J.2
Ahamad, M.3
Owen, H.4
-
2
-
-
0030421898
-
Dotplot Patterns: A Literal Look at Pattern Languages
-
Helfman, J.: Dotplot Patterns: A Literal Look at Pattern Languages. TAPOS Journal 2(1), 31-41 (1995)
-
(1995)
TAPOS Journal
, vol.2
, Issue.1
, pp. 31-41
-
-
Helfman, J.1
-
3
-
-
56449110379
-
December 20, 2007)
-
Blackhat USA , last accessed
-
Kaminsky, D.: Black Ops 2006. Blackhat USA (2006) (last accessed December 20, 2007), http://www.doxpara.com/slid.es/dmk_blackops2006.ppt
-
(2006)
-
-
Kaminsky, D.1
-
4
-
-
20444452578
-
Visualizing Windows Executable Viruses Using Self-Organizing Maps
-
Yoo, I.: Visualizing Windows Executable Viruses Using Self-Organizing Maps. VizSec/DMSec (2004)
-
(2004)
VizSec/DMSec
-
-
Yoo, I.1
-
5
-
-
54849432819
-
Digital Genome Mapping - Advanced Binary Malware Analysis
-
Carrera, E., Erdelyi, G.: Digital Genome Mapping - Advanced Binary Malware Analysis. In: Virus Bulletin Conference (2004)
-
(2004)
Virus Bulletin Conference
-
-
Carrera, E.1
Erdelyi, G.2
-
7
-
-
56449103087
-
-
A different look at Bagle. F-Secure Weblog (23 September 2005) (last accessed December 20, 2007), http://www.f-secure.com/weblog/archives/00000662. html
-
A different look at Bagle. F-Secure Weblog (23 September 2005) (last accessed December 20, 2007), http://www.f-secure.com/weblog/archives/00000662. html
-
-
-
-
8
-
-
56449100541
-
-
Graphing malware. F-Secure Weblog (25 October 2005) (last accessed December 20, 2007), http://www.f-secure.com/weblog/archives/00000324.html
-
Graphing malware. F-Secure Weblog (25 October 2005) (last accessed December 20, 2007), http://www.f-secure.com/weblog/archives/00000324.html
-
-
-
-
10
-
-
56449099354
-
-
Flake, H.: Diff, Navigate, Audit - Three applications of graphs and graphing for security, Blackhat USA (2004) (last accessed December 20, 2007), http: //www.blackhat.com/presentations/bh-usa-04/bh-us-04-flake.pdf
-
Flake, H.: Diff, Navigate, Audit - Three applications of graphs and graphing for security, Blackhat USA (2004) (last accessed December 20, 2007), http: //www.blackhat.com/presentations/bh-usa-04/bh-us-04-flake.pdf
-
-
-
-
12
-
-
56449102612
-
-
Kaminsky, D.: Black Ops 2006 : Viz Edition. Chaos Computer Congress (2006) (last accessed May 1, 2008), http://www.doxpara.com/slides/ dmk_blackops2006_ccc.ppt
-
Kaminsky, D.: Black Ops 2006 : Viz Edition. Chaos Computer Congress (2006) (last accessed May 1, 2008), http://www.doxpara.com/slides/ dmk_blackops2006_ccc.ppt
-
-
-
-
13
-
-
44149112234
-
-
Addison-Wesley, Reading
-
Sutton, M., Greene, A., Amini, P.: Fuzzing: Brute Force Vulnerability Discovery. Addison-Wesley, Reading (2007)
-
(2007)
Fuzzing: Brute Force Vulnerability Discovery
-
-
Sutton, M.1
Greene, A.2
Amini, P.3
|