Abstract is missing.
- Contextual network navigation to provide situational awareness for network administratorsCameron C. Gray, Panagiotis D. Ritsos, Jonathan C. Roberts. 1-8 [doi]
- Unlocking user-centered design methods for building cyber security visualizationsSean McKenna, Diane Staheli, Miriah Meyer. 1-8 [doi]
- Ensemble visualization for cyber situation awareness of network security dataLihua Hao, Christopher G. Healey, Steve E. Hutchinson. 1-8 [doi]
- Discovery of rating fraud with real-time streaming visual analyticsKodzo Webga, Aidong Lu. 1-8 [doi]
- A visual analytics loop for supporting model developmentSimon J. Walton, Eamonn Maguire, Min Chen. 1-8 [doi]
- Ocelot: user-centered design of a decision support visualization for network quarantineDustin Lockhart Arendt, Russ Burtner, Daniel M. Best, Nathan D. Bos, John R. Gersh, Christine D. Piatko, Celeste Lyn Paul. 1-8 [doi]
- Visualizing the insider threat: challenges and tools for identifying malicious user activityPhilip A. Legg. 1-7 [doi]
- Bitconeview: visualization of flows in the bitcoin transaction graphGiuseppe Di Battista, Valentino Di Donato, Maurizio Patrignani, Maurizio Pizzonia, Vincenzo Roselli, Roberto Tamassia. 1-8 [doi]
- PERCIVAL: proactive and reactive attack and response assessment for cyber incidents using visual analyticsMarco Angelini, Nicolas Prigent, Giuseppe Santucci. 1-8 [doi]
- Visual analytics for cyber red teamingJoseph Yuen, Benjamin Turnbull, Justin Hernandez. 1-8 [doi]
- SNAPS: Semantic network traffic analysis through projection and selectionBram C. M. Cappers, Jarke J. van Wijk. 1-8 [doi]