WSU 2-color logo

Welcome to

CEG7560 - Visualization and Image Processing for Cyber Security



Visualization as a research area has impacted an enormous number of engineering disciplines. In particular, it helps users get better insight into their data. In many areas, it is almost impossible to reasonably analyze data without an appropriate visualization due to the overwhelming amount of information present in the data. This is especially true for the area of cyber security in which large and complex data structures have to be explored in order to detect the presence of an intrusion or security issue. Similarly, automatic image analysis and visualization techniques are needed to process the vast amount of imagery collected nowadays. This course will provide you with techniques for generating visualizations of various different data types, including scalar, vector, and graph-type data. Geometric as well as image-based methodologies will be introduced. Advantages and disadvantages of the different methods are discussed to enable students to pick the optimal technique for a given type of data set. Different visualization and image processing environments are illustrated from common desktop environments to high-end virtual environments. Programming techniques for these environments are explained, including rendering techniques and different input paradigms. Programming examples are provided to enable students to immediately experience their own visualization application.

Course syllabus


In order to provide a programming environment suitable for this class, a cluster of virtual machines are available. The instructions for this are accessible via this link.

Sample code: Mace.cxx CMakeLists.txt

The slides used during the lecture can be downloaded here:

Introductary slides

Chapter 1

Chapter 2

Chapter 3

Chapter 4

Chapter 5

Chapter 6

Chapter 7

Midterm Review

Chapter 8

Chapter 9

Chapter 10

Chapter 11

Chapter 12

CORGI video

QCAT video

SEEM video

Visual Filter video

SNAPS video


Key Challenges video

Last modified Wednesday April 20, 2016