Abstract is missing.
- The goods, the bads and the uglies: Supporting decisions in malware detection through visual analyticsMarco Angelini, Leonardo Aniello, Simone Lenti, Giuseppe Santucci, Daniele Ucci. 1-8 [doi]
- Toward a visualization-supported workflow for cyber alert management using threat models and human-centered designLyndsey Franklin, Meg Pirrung, Leslie Blaha, Michelle Dowling, Mi Feng. 1-8 [doi]
- Adversarial-Playground: A visualization suite showing how adversarial examples fool deep learningAndrew P. Norton, Yanjun Qi. 1-4 [doi]
- Network-wide intrusion detection supported by multivariate analysis and interactive visualizationRoberto Therón, Roberto Magán-Carrión, Jose Camacho, Gabriel Macia Fernndez. 1-8 [doi]
- Interactive visualization toolbox to detect sophisticated android malwareGanesh Ram Santhanam, Benjamin Holland, Suresh Kothari, Jon Mathews. 1-8 [doi]
- CRUMBS: A cyber security framework browserMarco Angelini, Simone Lenti, Giuseppe Santucci. 1-8 [doi]
- Expert-interviews led analysis of EEVi - A model for effective visualization in cyber-securityAneesha Sethi, Gary Wills. 1-8 [doi]
- STARLORD: Linked security data exploration in a 3D graphLaetitia Leichtnam, Eric Totel, Nicolas Prigent, Ludovic Mé. 1-4 [doi]
- Towards designing effective visualizations for DNS-based network threat analysisRosa Romero Gómez, Yacin Nadji, Manos Antonakakis. 1-8 [doi]
- Firewall ruleset visualization analysis tool based on segmentationHyungSeok Kim, Sukjun Ko, Dong Seong Kim, Huy Kang Kim. 1-8 [doi]