A review of attack graph and attack tree visual syntax in cyber security

HS Lallie, K Debattista, J Bal - Computer Science Review, 2020 - Elsevier
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …

Information visualization on large, high-resolution displays: Issues, challenges, and opportunities

C Andrews, A Endert, B Yost… - Information …, 2011 - journals.sagepub.com
Larger, higher-resolution displays are becoming accessible to a greater number of users as
display technologies decrease in cost and software for the displays improves. The additional …

Enterprise data analysis and visualization: An interview study

S Kandel, A Paepcke, JM Hellerstein… - IEEE transactions on …, 2012 - ieeexplore.ieee.org
Organizations rely on data analysts to model customer engagement, streamline operations,
improve production, inform business decisions, and combat fraud. Though numerous …

Characterizing provenance in visualization and data analysis: an organizational framework of provenance types and purposes

ED Ragan, A Endert, J Sanyal… - IEEE transactions on …, 2015 - ieeexplore.ieee.org
While the primary goal of visual analytics research is to improve the quality of insights and
findings, a substantial amount of research in provenance has focused on the history of …

The human is the loop: new directions for visual analytics

A Endert, MS Hossain, N Ramakrishnan… - Journal of intelligent …, 2014 - Springer
Visual analytics is the science of marrying interactive visualizations and analytic algorithms
to support exploratory knowledge discovery in large datasets. We argue for a shift from a …

Systematic literature review on cyber situational awareness visualizations

L Jiang, A Jayatilaka, M Nasim, M Grobler… - Ieee …, 2022 - ieeexplore.ieee.org
The dynamics of cyber threats are increasingly complex, making it more challenging than
ever for organizations to obtain in-depth insights into their cyber security status. Therefore …

Situ: Identifying and explaining suspicious behavior in networks

JR Goodall, ED Ragan, CA Steed… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
Despite the best efforts of cyber security analysts, networked computing assets are routinely
compromised, resulting in the loss of intellectual property, the disclosure of state secrets …

Design activity framework for visualization design

S McKenna, D Mazur, J Agutter… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
An important aspect in visualization design is the connection between what a designer does
and the decisions the designer makes. Existing design process models, however, do not …

Visualization evaluation for cyber security: Trends and future directions

D Staheli, T Yu, RJ Crouser, S Damodaran… - Proceedings of the …, 2014 - dl.acm.org
The Visualization for Cyber Security research community (VizSec) addresses longstanding
challenges in cyber security by adapting and evaluating information visualization techniques …

Unlocking user-centered design methods for building cyber security visualizations

S McKenna, D Staheli, M Meyer - 2015 IEEE Symposium on …, 2015 - ieeexplore.ieee.org
User-centered design can aid visualization designers to build better, more practical tools
that meet the needs of cyber security users. The cyber security visualization research …