Abstract is missing.
- Automatic Narrative Summarization for Visualizing Cyber Security Logs and Incident ReportsRobert Gove. 1-9 [doi]
- AI Total: Analyzing Security ML Models with Imperfect Data in ProductionAwalin Sopan, Konstantin Berlin. 10-14 [doi]
- BUCEPHALUS: a BUsiness CEntric cybersecurity Platform for proActive anaLysis Using visual analyticSMarco Angelini, Graziano Blasilli, Silvia Bonomi, Simone Lenti, Alessia Palleschi, Giuseppe Santucci, Emiliano De Paoli. 15-25 [doi]
- Decision Support for Sharing Data using Differential PrivacyMark F. St. John, Grit Denker, Peeter Laud, Karsten Martiny, Alisa Pankova, Dusko Pavlovic. 26-35 [doi]
- SAGE: Intrusion Alert-driven Attack Graph ExtractorAzqa Nadeem, Sicco Verwer, Shanchieh Jay Yang. 36-41 [doi]
- Towards Visual Analytics Dashboards for Provenance-driven Static Application Security TestingAndreas Schreiber 0001, Tim Sonnekalb, Lynn von Kurnatowski. 42-46 [doi]
- Developing Visualisations to Enhance an Insider Threat Product: A Case StudyMartin Graham 0001, Robert Kukla, Oleksii Mandrychenko, Darren Hart, Jessie Kennedy. 47-57 [doi]
- Visual Decision-Support for Live Digital ForensicsFabian Böhm, Ludwig Englbrecht, Sabrina Friedl, Günther Pernul. 58-67 [doi]
- User-Centered Design of Visualizations for Software Vulnerability ReportsSteven Lamarr Reynolds, Tobias Mertz, Steven Arzt, Jörn Kohlhammer. 68-78 [doi]
- VulnEx: Exploring Open-Source Software Vulnerabilities in Large Development Organizations to Understand Risk ExposureFrederik L. Dennig, Eren Cakmak, Henrik Plate, Daniel A. Keim. 79-83 [doi]