Vulnus: Visual vulnerability analysis for network security

M Angelini, G Blasilli, T Catarci, S Lenti… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
Vulnerabilities represent one of the main weaknesses of IT systems and the availability of
consolidated official data, like CVE (Common Vulnerabilities and Exposures), allows for …

An evaluation framework for network security visualizations

I Sharafaldin, AH Lashkari, AA Ghorbani - Computers & Security, 2019 - Elsevier
Visualization helps to comprehend and analyze large amounts of data, a fundamental
necessity for network security due to the large volume of audits traces produced each day. In …

Visual analytics for cyber security domain: State-of-the-art and challenges

R Damaševičius, J Toldinas, A Venčkauskas… - … Conference, ICIST 2019 …, 2019 - Springer
Visual Analytics is a complex sub-field of data analytics that concentrates on the use of the
information visualization methods for facilitating effective analysis of data by employing …

A sociotechnical systems analysis of knowledge management for cybersecurity

S Wang, H Wang - International Journal of Sociotechnology and …, 2021 - igi-global.com
Abstract Knowledge management (KM) is a tool to tackle cybersecurity issues, provided it
emphasizes on the interrelated social, organizational, and technological factors involved in …

Phoenixmap: An abstract approach to visualize 2d spatial distributions

J Zhao, X Liu, C Guo, ZC Qian… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The multidimensional nature of spatial data poses a challenge for visualization. In this
paper, we introduce Phoenixmap, a simple abstract visualization method to address the …

Big Data and Cyber security: A visual Analytics perspective

S Mazumdar, J Wang - Guide to Vulnerability Analysis for Computer …, 2018 - Springer
With organisations and governments significantly investing in cyber defenses, there is an
urgent need to develop tools and technologies to help security professionals understand …

An attempt at defining cyberdefense situation awareness in the context of command & control

W Mees, T Debatty - 2015 International Conference on Military …, 2015 - ieeexplore.ieee.org
In this paper we present an overview of the most important views on situation awareness in
literature. We then go on to apply these concepts to cyberdefense. The main contribution of …

Marcs: mobile augmented reality for cybersecurity

B Mattina, F Yeung, A Hsu, D Savoy, J Tront… - Proceedings of the 12th …, 2017 - dl.acm.org
Network analysts have long used two-dimensional security visualizations to make sense of
overwhelming amounts of network data. As networks grow larger and more complex, two …

A visual analytics approach to detecting server redirections and data exfiltration

W Wang, B Yang, VY Chen - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
How to better find potential cyberattacks is a challenging question for security researchers
and practitioners. In recent years, visualization has been applied in the field of analyzing …

Fluency of visualizations: linking spatiotemporal visualizations to improve cybersecurity visual analytics

ZC Qian, YV Chen - Security Informatics, 2014 - Springer
This paper adopts the metaphor of representational fluency and proposes an auto linking
approach to help analysts investigate details of suspicious sections across different …