Vulnus: Visual vulnerability analysis for network security
Vulnerabilities represent one of the main weaknesses of IT systems and the availability of
consolidated official data, like CVE (Common Vulnerabilities and Exposures), allows for …
consolidated official data, like CVE (Common Vulnerabilities and Exposures), allows for …
An evaluation framework for network security visualizations
Visualization helps to comprehend and analyze large amounts of data, a fundamental
necessity for network security due to the large volume of audits traces produced each day. In …
necessity for network security due to the large volume of audits traces produced each day. In …
Visual analytics for cyber security domain: State-of-the-art and challenges
Visual Analytics is a complex sub-field of data analytics that concentrates on the use of the
information visualization methods for facilitating effective analysis of data by employing …
information visualization methods for facilitating effective analysis of data by employing …
A sociotechnical systems analysis of knowledge management for cybersecurity
Abstract Knowledge management (KM) is a tool to tackle cybersecurity issues, provided it
emphasizes on the interrelated social, organizational, and technological factors involved in …
emphasizes on the interrelated social, organizational, and technological factors involved in …
Phoenixmap: An abstract approach to visualize 2d spatial distributions
The multidimensional nature of spatial data poses a challenge for visualization. In this
paper, we introduce Phoenixmap, a simple abstract visualization method to address the …
paper, we introduce Phoenixmap, a simple abstract visualization method to address the …
Big Data and Cyber security: A visual Analytics perspective
S Mazumdar, J Wang - Guide to Vulnerability Analysis for Computer …, 2018 - Springer
With organisations and governments significantly investing in cyber defenses, there is an
urgent need to develop tools and technologies to help security professionals understand …
urgent need to develop tools and technologies to help security professionals understand …
An attempt at defining cyberdefense situation awareness in the context of command & control
In this paper we present an overview of the most important views on situation awareness in
literature. We then go on to apply these concepts to cyberdefense. The main contribution of …
literature. We then go on to apply these concepts to cyberdefense. The main contribution of …
Marcs: mobile augmented reality for cybersecurity
B Mattina, F Yeung, A Hsu, D Savoy, J Tront… - Proceedings of the 12th …, 2017 - dl.acm.org
Network analysts have long used two-dimensional security visualizations to make sense of
overwhelming amounts of network data. As networks grow larger and more complex, two …
overwhelming amounts of network data. As networks grow larger and more complex, two …
A visual analytics approach to detecting server redirections and data exfiltration
How to better find potential cyberattacks is a challenging question for security researchers
and practitioners. In recent years, visualization has been applied in the field of analyzing …
and practitioners. In recent years, visualization has been applied in the field of analyzing …
Fluency of visualizations: linking spatiotemporal visualizations to improve cybersecurity visual analytics
This paper adopts the metaphor of representational fluency and proposes an auto linking
approach to help analysts investigate details of suspicious sections across different …
approach to help analysts investigate details of suspicious sections across different …