A review of attack graph and attack tree visual syntax in cyber security
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …
Information visualization on large, high-resolution displays: Issues, challenges, and opportunities
Larger, higher-resolution displays are becoming accessible to a greater number of users as
display technologies decrease in cost and software for the displays improves. The additional …
display technologies decrease in cost and software for the displays improves. The additional …
Enterprise data analysis and visualization: An interview study
S Kandel, A Paepcke, JM Hellerstein… - IEEE transactions on …, 2012 - ieeexplore.ieee.org
Organizations rely on data analysts to model customer engagement, streamline operations,
improve production, inform business decisions, and combat fraud. Though numerous …
improve production, inform business decisions, and combat fraud. Though numerous …
Characterizing provenance in visualization and data analysis: an organizational framework of provenance types and purposes
While the primary goal of visual analytics research is to improve the quality of insights and
findings, a substantial amount of research in provenance has focused on the history of …
findings, a substantial amount of research in provenance has focused on the history of …
The human is the loop: new directions for visual analytics
Visual analytics is the science of marrying interactive visualizations and analytic algorithms
to support exploratory knowledge discovery in large datasets. We argue for a shift from a …
to support exploratory knowledge discovery in large datasets. We argue for a shift from a …
Systematic literature review on cyber situational awareness visualizations
The dynamics of cyber threats are increasingly complex, making it more challenging than
ever for organizations to obtain in-depth insights into their cyber security status. Therefore …
ever for organizations to obtain in-depth insights into their cyber security status. Therefore …
Situ: Identifying and explaining suspicious behavior in networks
Despite the best efforts of cyber security analysts, networked computing assets are routinely
compromised, resulting in the loss of intellectual property, the disclosure of state secrets …
compromised, resulting in the loss of intellectual property, the disclosure of state secrets …
Design activity framework for visualization design
An important aspect in visualization design is the connection between what a designer does
and the decisions the designer makes. Existing design process models, however, do not …
and the decisions the designer makes. Existing design process models, however, do not …
Visualization evaluation for cyber security: Trends and future directions
The Visualization for Cyber Security research community (VizSec) addresses longstanding
challenges in cyber security by adapting and evaluating information visualization techniques …
challenges in cyber security by adapting and evaluating information visualization techniques …
Unlocking user-centered design methods for building cyber security visualizations
User-centered design can aid visualization designers to build better, more practical tools
that meet the needs of cyber security users. The cyber security visualization research …
that meet the needs of cyber security users. The cyber security visualization research …