Use of data visualisation for zero‐day malware detection

S Venkatraman, M Alazab - Security and Communication …, 2018 - Wiley Online Library
With the explosion of Internet of Things (IoT) worldwide, there is an increasing threat from
malicious software (malware) attackers that calls for efficient monitoring of vulnerable …

The role of security notices and online consumer behaviour: An empirical study of social networking users

V Benson, G Saridakis, H Tennakoon… - International Journal of …, 2015 - Elsevier
This paper uses a survey of social networking users to empirically explore their perceptions
of security notices–independently verified artefacts informing internet site users that security …

Methods for host-based intrusion detection with deep learning

JH Ring IV, CM Van Oort, S Durst, V White… - … Threats: Research and …, 2021 - dl.acm.org
Host-based Intrusion Detection Systems (HIDS) automatically detect events that indicate
compromise by adversarial applications. HIDS are generally formulated as analyses of …

Ensemble visualization for cyber situation awareness of network security data

L Hao, CG Healey… - 2015 IEEE Symposium on …, 2015 - ieeexplore.ieee.org
Network security analysis and ensemble data visualization are two active research areas.
Although they are treated as separate domains, they share many common challenges and …

Enhancing cyber situation awareness for non-expert users using visual analytics

PA Legg - 2016 International Conference On Cyber Situational …, 2016 - ieeexplore.ieee.org
Situation awareness is often described as the perception and comprehension of the current
situation, and the projection of future status. Whilst this may be understood in an …

Visual analytics for cyber security domain: State-of-the-art and challenges

R Damaševičius, J Toldinas, A Venčkauskas… - … Conference, ICIST 2019 …, 2019 - Springer
Visual Analytics is a complex sub-field of data analytics that concentrates on the use of the
information visualization methods for facilitating effective analysis of data by employing …

Flexible web visualization for alert-based network security analytics

L Hao, CG Healey, SE Hutchinson - Proceedings of the tenth workshop …, 2013 - dl.acm.org
This paper describes a web-based visualization system designed for network security
analysts at the US Army Research Laboratory (ARL). Our goal is to provide visual support to …

Weaving a carpet from log entries: A network security visualization built with co-creation

J Landstorfer, I Herrmann, JE Stange… - … IEEE Conference on …, 2014 - ieeexplore.ieee.org
We created a pixel map for multivariate data based on an analysis of the needs of network
security engineers. Parameters of a log record are shown as pixels and these pixels are …

Discovery of rating fraud with real-time streaming visual analytics

K Webga, A Lu - 2015 IEEE symposium on visualization for …, 2015 - ieeexplore.ieee.org
The rating fraud in online e-commerce stores targets at receiving large revenues through
boosting the popularity of selected items with fake ratings. The challenges of detecting rating …

Technical threat intelligence analytics: What and how to visualize for analytic process

R Damasevicius, J Toldinas… - 2020 24th …, 2020 - ieeexplore.ieee.org
Visual Analytics uses data visualization techniques for enabling compelling data analysis by
engaging graphical and visual portrayal. In the domain of cybersecurity, convincing visual …