0
Your cart

Your cart is empty

Books > Computing & IT > Applications of computing > Databases > Data mining

Buy Now

Visualization for Computer Security - 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008, Proceedings (Paperback, All Figures App) Loot Price: R1,539
Discovery Miles 15 390
Visualization for Computer Security - 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008,...

Visualization for Computer Security - 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008, Proceedings (Paperback, All Figures App)

John R. Goodall, Gregory Conti, Kwan-Liu Ma

Series: Security and Cryptology, 5210

 (sign in to rate)
Loot Price R1,539 Discovery Miles 15 390 | Repayment Terms: R144 pm x 12*

Bookmark and Share

Expected to ship within 10 - 15 working days

This volumecontains the paperspresented at VizSec 2008, the 5th International Workshop on Visualization for Cyber Security, held on September 15, 2008 in Cambridge, Massachusetts, USA. VizSec 2008 was held in conjunction with the 11thInternationalSymposiumonRecentAdvancesinIntrusionDetection(RAID). There were 27 submissions to the long and short paper categories. Each submission was reviewed by at least 2 reviewers and, on average, 2.9 program committee members. The program committee decided to accept 18 papers. The program also included an invited talk and a panel. The keynote address was given by Ben Shneiderman, University of Maryland at College Park, on the topic InformationForensics: HarnessingVisualizationto SupportDiscovery.The panel, on the topic The Need for Applied Visualization in Information Security Today, wasorganizedandmoderatedbyTobyKohlenbergfromIntelCorporation. July 2008 John R. Goodall Conference Organization Program Chairs John R. Goodall Secure Decisions division of Applied Visions Gregory Conti United States Military Academy Kwan-Liu Ma University of California at Davis Program Committee Stefan Axelsson Blekinge Institute of Technology Richard Bejtlich General Electric Kris Cook Paci?c Northwest National Laboratory David Ebert Purdue University Robert Erbacher Utah State University Deborah Frincke Paci?c Northwest National Laboratory Carrie Gates CA Labs John Gerth Stanford University Barry Irwin Rhodes University Daniel Keim University of Konstanz Toby Kohlenberg Intel Corporation Stuart Kurkowski Air Force Institute of Technology Kiran Lakkaraju University of Illinois at Urbana-Champaign Ra?ael Marty Splunk Douglas Maughan Department of Homeland Security John McHugh Dalhousie University Penny Rheingans UMBC Lawrence Rosenblum National Science Foundation George Tadda Air Force Research Lab Daniel Tesone Applied Visions Alfonso Valdes SRI Internatio

General

Imprint: Springer-Verlag
Country of origin: Germany
Series: Security and Cryptology, 5210
Release date: August 2008
First published: 2008
Editors: John R. Goodall • Gregory Conti • Kwan-Liu Ma
Dimensions: 235 x 155 x 11mm (L x W x T)
Format: Paperback
Pages: 197
Edition: All Figures App
ISBN-13: 978-3-540-85931-4
Categories: Books > Science & Mathematics > Mathematics > Combinatorics & graph theory
Books > Computing & IT > General theory of computing > Data structures
Books > Computing & IT > Computer programming > Algorithms & procedures
Books > Computing & IT > Internet > Network computers
Books > Computing & IT > Applications of computing > Databases > Data mining
Books > Computing & IT > Applications of computing > Artificial intelligence > Computer vision
Promotions
LSN: 3-540-85931-4
Barcode: 9783540859314

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

Partners