Systematic literature review on cyber situational awareness visualizations

L Jiang, A Jayatilaka, M Nasim, M Grobler… - Ieee …, 2022 - ieeexplore.ieee.org
The dynamics of cyber threats are increasingly complex, making it more challenging than
ever for organizations to obtain in-depth insights into their cyber security status. Therefore …

[HTML][HTML] Data transformation schemes for cnn-based network traffic analysis: A survey

J Krupski, W Graniszewski, M Iwanowski - Electronics, 2021 - mdpi.com
The enormous growth of services and data transmitted over the internet, the bloodstream of
modern civilization, has caused a remarkable increase in cyber attack threats. This fact has …

SoK: Contemporary issues and challenges to enable cyber situational awareness for network security

M Husák, T Jirsík, SJ Yang - … of the 15th International Conference on …, 2020 - dl.acm.org
Cyber situational awareness is an essential part of cyber defense that allows the
cybersecurity operators to cope with the complexity of today's networks and threat …

[HTML][HTML] A survey on visual data representation for smart grids control and monitoring

MA Sanchez-Hidalgo, MD Cano - Sustainable Energy, Grids and Networks, 2018 - Elsevier
The legacy grid is evolving towards an intelligent-rooted grid system, whose architectural
components should be able to improve and adapt their performance according to learning …

The missing link in network intrusion detection: Taking AI/ML research efforts to users

K Dietz, M Mühlhauser, J Kögel, S Schwinger… - IEEE …, 2024 - ieeexplore.ieee.org
Intrusion Detection Systems (IDS) tackle the challenging task of detecting network attacks as
fast as possible. As this is getting more complex in modern enterprise networks, Artificial …

Vulnus: Visual vulnerability analysis for network security

M Angelini, G Blasilli, T Catarci, S Lenti… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
Vulnerabilities represent one of the main weaknesses of IT systems and the availability of
consolidated official data, like CVE (Common Vulnerabilities and Exposures), allows for …

Visualization of class activation maps to explain AI classification of network packet captures

I Cherepanov, A Ulmer, JG Joewono… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
The classification of internet traffic has become increasingly important due to the rapid
growth of today's networks and application variety. The number of connections and the …

Cyber forensic analysis for operational technology using graph-based deep learning

A Presekal, A Ştefanov, VS Rajkumar… - … for Smart Grids …, 2023 - ieeexplore.ieee.org
The cyber attacks in Ukraine in 2015 and 2016 demonstrated the vulnerability of electrical
power grids to cyber threats. They highlighted the significance of Operational Technology …

Netcapvis: Web-based progressive visual analytics for network packet captures

A Ulmer, D Sessler… - 2019 IEEE Symposium on …, 2019 - ieeexplore.ieee.org
Network traffic log data is a key data source for forensic analysis of cybersecurity incidents.
Packet Captures (PCAPs) are the raw information directly gathered from the network device …

Visual analytics for root dns data

E Krokos, A Rowden, K Whitley… - 2018 IEEE Symposium on …, 2018 - computer.org
The analysis of vast amounts of network data for monitoring and safeguarding a core pillar of
the internet, the root DNS, is an enormous challenge. Understanding the distribution of the …