Abstract is missing.
- An Empirical Study on Perceptually Masking Privacy in Graph VisualizationsJia-Kai Chou, Chris Bryan, Jing Li, Kwan-Liu Ma. 1-8 [doi]
- Visual Analytics for Root DNS DataEric Krokos, Alexander Rowden, Kirsten Whitley, Amitabh Varshney. 1-8 [doi]
- Looking for a Black Cat in a Dark Room: Security Visualization for Cyber-Physical System Design and AnalysisGeorgios Bakirtzis, Brandon J. Simon, Cody Harrison Fleming, Carl R. Elks. 1-8 [doi]
- 2ES Then CHISSL AwayDustin Lockhart Arendt, Lyndsey R. Franklin, Fumeng Yang, Brooke R. Brisbois, Ryan R. LaMothe. 1-8 [doi]
- Building a Machine Learning Model for the SOC, by the Input from the SOC, and Analyzing it for the SOCAwalin Sopan, Matthew Berninger, Murali Mulakaluri, Raj Katakam. 1-8 [doi]
- TAPESTRY: Visualizing Interwoven Identities for Trust ProvenanceYifan Yang, John Collomosse, Arthi Kanchana Manohar, Jo Briggs, Jamie Steane. 1-4 [doi]
- User Behavior Map: Visual Exploration for Cyber Security Session DataSiming Chen, Shuai Chen, Natalia V. Andrienko, Gennady L. Andrienko, Phong H. Nguyen, Cagatay Turkay, Olivier Thonnard, Xiaoru Yuan. 1-4 [doi]
- Visual-Interactive Identification of Anomalous IP-Block Behavior Using Geo-IP DataAlex Ulmer, Marija Schufrin, David Sessler, Jörn Kohlhammer. 1-8 [doi]
- ROPMate: Visually Assisting the Creation of ROP-based ExploitsMarco Angelini, Graziano Blasilli, Pietro Borrello, Emilio Coppa, Daniele Cono D'Elia, Serena Ferracci, Simone Lenti, Giuseppe Santucci. 1-8 [doi]
- Eventpad: Rapid Malware Analysis and Reverse Engineering using Visual AnalyticsBram C. M. Cappers, Paulus N. Meessen, Sandro Etalle, Jarke J. van Wijk. 1-8 [doi]
- Visualizing Automatically Detected Periodic Network ActivityRobert Gove, Lauren Deason. 1-8 [doi]