參考文獻 |
Reference
[1] Chelsea Noelani Adams and Dallas H. Snider. Effective data visualization in cybersecurity. In SoutheastCon 2018, pages 1–8, 2018.
[2] Nadia Boukhelifa and Peter J. Rodgers. A model and software system for coordinated and multiple views in exploratory visualization. Information Visualization, 2:258 – 269, 2003.
[3] Fabian Bohm, Florian Menges, and G ¨ unther Pernul. Graph-based visual ¨ analytics for cyber threat intelligence. Cybersecurity, 1, 12 2018.
[4] Stuart Card, Jock Mackinlay, and Ben Shneiderman. Readings in Information Visualization: Using Vision To Think. 01 1999.
[5] Maxime Cordeil, Andrew Cunningham, Tim Dwyer, Bruce H. Thomas, and Kim Marriott. Imaxes: Immersive axes as embodied affordances for interactive multivariate data visualisation. In Proceedings of the 30th Annual ACM Symposium on User Interface Software and Technology, UIST ’17, page 71–83, New York, NY, USA, 2017. Association for Computing Machinery.
[6] Alex Endert, Patrick Fiaux, and Chris North. Semantic interaction for visual text analytics. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’12, page 473–482, New York, NY, USA, 2012. Association for Computing Machinery.
[7] Patrick Fiaux, Maoyuan Sun, Lauren Bradel, Chris North, Naren Ramakrishnan, and Alex Endert. Bixplorer: Visual analytics with biclusters. Computer, 46(8):90–94, 2013.
[8] John R. Goodall, Eric D. Ragan, Chad A. Steed, Joel W. Reed, G. David Richardson, Kelly M.T. Huffer, Robert A. Bridges, and Jason A. Laska. Situ: Identifying and explaining suspicious behavior in networks. IEEE Transactions on Visualization and Computer Graphics, 25(1):204–214, 2019.
[9] Robert Gove. Automatic narrative summarization for visualizing cyber security logs and incident reports. In 2021 IEEE Symposium on Visualization for Cyber Security (VizSec), pages 1–9, 2021.
[10] Lihua Hao, Christopher G. Healey, and Steve E. Hutchinson. Ensemble visualization for cyber situation awareness of network security data. In 2015 IEEE Symposium on Visualization for Cyber Security (VizSec), pages 1–8, 2015.
[11] Nathalie Henry, Jean-Daniel Fekete, and Michael J. McGuffin. Nodetrix: a hybrid visualization of social networks. IEEE Transactions on Visualization and Computer Graphics, 13(6):1302–1309, 2007.
[12] Jean-Franc¸ois Im, Michael J. McGuffin, and Rock Leung. Gplom: The generalized plot matrix for visualizing multidimensional multivariate data. IEEE Transactions on Visualization and Computer Graphics, 19(12):2606–2614, 2013.
[13] Laetitia Leichtnam, Eric Totel, Nicolas Prigent, and Ludovic M ´ e. Star- ´ lord: Linked security data exploration in a 3d graph. In 2017 IEEE Symposium on Visualization for Cyber Security (VizSec), pages 1–4, 2017.
[14] Alexander Lex, Marc Streit, Ernst Kruijff, and Dieter Schmalstieg. Caleydo: Design and evaluation of a visual analysis framework for gene expression data in its biological context. In 2010 IEEE Pacific Visualization Symposium (PacificVis), pages 57–64, 2010.
[15] Fernando Maym ´ı, Robert Bixler, Randolph Jones, and Scott Lathrop. Towards a definition of cyberspace tactics, techniques and procedures. In 2017 IEEE International Conference on Big Data (Big Data), pages 4674–4679, 2017.
[16] Sebastian Peryt, Jose Andre Morales, William Casey, Aaron Volkmann, Bud Mishra, and Yang Cai. Visualizing a malware distribution network. In 2016 IEEE Symposium on Visualization for Cyber Security (VizSec) , pages 1–4, 2016.
[17] SANS. Sans. https://www.sans.org/apac/, 2024.
[18] Hadi Shiravi, Ali Shiravi, and Ali A. Ghorbani. A survey of visualization systems for network security. IEEE Transactions on Visualization and Computer Graphics, 18(8):1313–1329, 2012.
[19] John Stasko, Carsten Gorg, Zhicheng Liu, and Kanupriya Singhal. Jigsaw: Supporting investigative analysis through interactive visualization. In 2007 IEEE Symposium on Visual Analytics Science and Technology , pages 131–138, 2007.
[20] Maoyuan Sun, Abdul Rahman Shaikh, Hamed Alhoori, and Jian Zhao. Sightbi: Exploring cross-view data relationships with biclusters. IEEE Transactions on Visualization and Computer Graphics, 28(1):54–64, 2022.
[21] Wiem Tounsi and Helmi Rais. A survey on technical threat intelligence in the age of sophisticated cyber attacks. Computers Security, 72:212– 233, 2018.
[22] VERZION. 2020 dbir. https://www.verizon.com/business/resources/ reports/dbir/, 2020.
[23] Nikos Virvilis and Dimitris Gritzalis. The big four - what we did wrong in advanced persistent threat detection? In 2013 International Conference on Availability, Reliability and Security, pages 248–254, 2013.
[24] C. Weaver. Building highly-coordinated visualizations in improvise. In IEEE Symposium on Information Visualization, pages 159–166, 2004.
[25] Chris Weaver. Cross-filtered views for multidimensional visual analysis. IEEE Transactions on Visualization and Computer Graphics, 16(2):192– 204, 2010.
[26] Panpan Xu, Nan Cao, Huamin Qu, and John Stasko. Interactive visual co-cluster analysis of bipartite graphs. In 2016 IEEE Pacific Visualization Symposium (PacificVis), pages 32–39, 2016. |