Abstract is missing.
- OCEANS: online collaborative explorative analysis on network securitySiming Chen, Cong Guo, Xiaoru Yuan, Fabian Merkle, Hanna Schaefer, Thomas Ertl. 1-8 [doi]
- Problem characterization and abstraction for visual analytics in behavior-based malware pattern analysisMarkus Wagner, Wolfgang Aigner, Alexander Rind, Hermann Dornhackl, Konstantin Kadletz, Robert Luh, Paul Tavolato. 9-16 [doi]
- Multiple queries with conditional attributes (QCATs) for anomaly detection and visualizationSimon J. Walton, Eamonn Maguire, Min Chen. 17-24 [doi]
- DAVAST: data-centric system level activity visualizationTobias Wüchner, Alexander Pretschner, Martín Ochoa. 25-32 [doi]
- 7 key challenges for visualization in cyber network defenseDaniel M. Best, Alex Endert, Daniel Kidwell. 33-40 [doi]
- Visual filter: graphical exploration of network security log filesJan-Erik Stange, Marian Dörk, Johannes Landstorfer, Reto Wettach. 41-48 [doi]
- Visualization evaluation for cyber security: trends and future directionsDiane Staheli, Tamara Yu, R. Jordan Crouser, Suresh Damodaran, Kevin Nam, B. David O'Gwynn, Sean McKenna, Lane Harrison. 49-56 [doi]
- CORGI: combination, organization and reconstruction through graphical interactionsChristopher Humphries, Nicolas Prigent, Christophe Bidan, Frédéric Majorczyk. 57-64 [doi]
- NStreamAware: real-time visual analytics for data streams to enhance situational awarenessFabian Fischer, Daniel A. Keim. 65-72 [doi]
- SEEM: a scalable visualization for comparing multiple large sets of attributes for malware analysisRobert Gove, Joshua Saxe, Sigfried Gold, Alexander Long, Giacomo Bergamo. 72-79 [doi]
- IMap: visualizing network activity over internet mapsJ. Joseph Fowler, Thienne Johnson, Paolo Simonetto, Michael Schneider, Carlos Acedo, Stephen G. Kobourov, Loukas Lazos. 80-87 [doi]
- Detecting malware samples with similar image setsAlexander Long, Joshua Saxe, Robert Gove. 88-95 [doi]