Graph-based visual analytics for cyber threat intelligence
Tóm tắt
Từ khóa
Tài liệu tham khảo
Ackoff RL (1989) From data to wisdom. Journal of applied systems analysis 16(1): 3–9
Asgarli E, Burger E (2016) Semantic ontologies for cyber threat sharing standards. In: IEEE Symposium on Technologies for Homeland Security (HST)
Card SK, Mackinlay JD, Shneiderman B (eds) (1999) Readings in information visualization: using vision to think. Morgan Kaufmann, Burlington
Chang R, Ziemkiewicz C, Green TM, Ribarsky W (2009) Defining insight for visual analytics. IEEE Comput Graph Appl 29(2):14–17
Chen C (2005) Top 10 unsolved information visualization problems. IEEE Comput Graph Appl 25(4):12–16
Chen M, Ebert D, Hagen H, Laramee RS, van Liere R, Ma K, Ribarsky W, Scheuermann G, Silver D (2009) Data, information, and knowledge in visualization. IEEE Comput Graph Appl 29(1):12–19
Coleman J, Goettsch A, Savchenko A, Kollmann H, Wang K, Klement E, Bono P (1996) Teleinvivo™: towards collaborative volume visualization environments. Computers & Graphics 20(6):801–811
Endert A, Fiaux P, North C (2012) Semantic interaction for visual text analytics. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, New York
Fayyad U, Grinstein GG, Wierse A (2002) Information visualization in data mining and knowledge discovery. Morgan Kaufmann, Burlington
Federico P, Wagner M, Rind A, Amor-Amoròs A, Miksch S, Aigner W (2017) The role of explicit knowledge: A conceptual model of knowledge-assisted visual analytics. In: Proceedings of IEEE Conference on Visual Analytics Science and Technology (VAST). IEEE Computer Society Press, Los Alamitos
Heer J, Bostock M, Ogievetsky V (2010) A tour through the visualization zoo. Communications of the ACM 53(5):59–67
Heer J, Shneiderman B (2012) Interactive dynamics for visual analysis. Queue - Microprocessors 10(2):30
Keim D, Andrienko G, Fekete J-D, Görg C, Kohlhammer J, Melan.con G (2008) Visual analytics: definition, Process, and challenges. In: Information visualization. Lecture notes in computer science, vol 4950. Springer, Berlin, Heidelberg
Keim, D., Kohlhammer, J., Ellis, G., Mansmann, F. (eds.): Mastering the information age: solving problems with visual analytics, Goslar (2010)
Kobourov SG (2010) Force-directed drawing algorithms. In: Tamassia R (ed) Handbook of graph drawing and visualization. CRC Press, Boca Raton
Krasner GE, Pope ST (2000) A description of the model-view-controller user interface paradigm in the smalltalk-80 system. Journal of object oriented programming 1(3):26–49
Lazar J, Feng JH, Hochheiser H (2010) Research methods in human-computer interaction. Morgan Kaufmann, Burlington
Leichtnam L, Totel E, Prigent N, Mé L (2017) Starlord: Linked security data exploration in a 3d graph. In: IEEE Symposium on Visualization for Cyber Security (VizSec)
Luttgens JT, Pepe M, Mandia K (2014) Incident Response & Computer Forensics, 3rd edn. McGraw-Hill Education Group, Whitby
Marty R (2009) Applied security visualization. Addison-Wesley, Boston
Menges F, Pernul G (2018) A comparative analysis of incident reporting formats. Computers and Security 73:87–101
Nonaka I, Takeuchi H (1995) The knowledge-creating company: how Japanese companies create the Dynamcis of innovation. Oxford University Press, Oxford
Piazza R, Wunder J, Jordan B (2017a) STIX™ version 2.0. Part 1: STIX Core concepts. OASIS committee
Piazza R, Wunder J, Jordan B (2017b) STIX™ version 2.0. Part 2: STIX objects. OASIS committee
Pike WA, Stasko J, Chang R, O’Connell TA (2009) The science of interaction. Information Visualization 8(4):263–274
Pirolli P, Card S (2005) The sensemaking process and leverage points for analyst technology as identified through cognitive task analysis. In: Proceedings of International Conference on Intelligence Analysis McLean, VA, USA
Polanyi M (1983) The tacit dimension. University of Chicago Press, Chicago
Sacha D, Stoffel A, Stoffel F, Kwon BC, Ellis G, Keim D (2014) Knowledge generation model for visual analytics. IEEE Trans Vis Comput Graph 20(12):1604–1613
Sauerwein C, Sillaber CN, Mussmann A, Breu R (2017) Threat intelligence sharing platforms : An exploratory study of software vendors and research perspectives. In: 13. Internationale Tagung Wirtschaftsinformatik, WI 2017, St. Gallen
Severino, R.: The data visualisation Catalogue (2018). https://datavizcatalogue.com/index.html . Accessed 2018-08-03
Shackleford D (2015) Who’s using Cyberthreat intelligence and how? SANS institute, Swansea
Shackleford D (2016) SANS 2016 Security Analytics Survey. SANS Institute, Swansea
Shneiderman B (1996) The eyes have it: A task by data type taxonomy for information visualizations. In: Proceedings of the 1996 IEEE Symposium on Visual Languages. IEEE Computer Society Press, Los Alamitos
Shrinivasan YB, van Wijk JJ (2008) Supporting the analytical reasoning process in information visualization. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, New York
Staheli D, Yu T, Crouser RJ, Damodaran S, Nam K, O’Gwynn D, McKenna S, Harrison L (2014) Visualization evaluation for cyber security. In: IEEE Symposium on Visualization for Cyber Security (VizSec). ACM, New York
Theron R, Magán-Carrión R, Camacho J, Fernandez GM (2017) Network-wide intrusion detection supported by multivariate analysis and interactive visualization. In: IEEE Symposium on Visualization for Cyber Security (VizSec). IEEE Computer Society Press, Los Alamitos
Thomas JJ, Cook KA (eds) (2005) Illuminating the Path: The Research and Development Agenda for Visual Analytics. IEEE Computer Society Press, Los Alamitos
Wagner M, Rind A, Thür N, Aigner W (2017) A knowledge-assisted visual malware analysis system: design, validation, and reflection of Kamas. Computers &Security 67:1–15
Wang X, Jeong DH, Dou W, Lee S-W, Ribarsky W, Chang R (2009) Defining and applying knowledge conversion processes to a visual analytics system. Computers & Graphics 33(5):616–623
Yen J, Erbacher RF, Zhong C, Liu P (2014) In: Kott A, Wang C, Erbacher RF (eds) Cognitive Process. Springer, Cham
Zhong C, Yen J, Liu P, Erbacher RF (2018) Learning from experts’ experience: toward automated cyber security data triage. IEEE Systems Journal:1–12