Introduction to Visualization for Computer Security |
|
Supporting the Cyber Analytic Process using Visual History on Large Displays |
|
Information Visualization, Visual Data Mining, and Machine Learning |
|
Cognitive Foundations for Visual Analytics |
|
Perception Driven Techniques for the Effective Visualization of Large Volume Data |
|
Interest Driven Navigation in Visualization |
|
Visualization of Mined Pattern and Its Human Aspects |
|
Exploring Ensemble Visualization |
|
Towards Classifying and Selecting Appropriate Security Visualization Techniques |
|
Nimble Cybersecurity Incident Management through Visualization and Defensible Recommendations |
|
Isolated Virtualized Clusters: Testbeds for High-Risk Security Experimentation and Training |
|
CERT Data Science in Cybersecurity Symposium 2018 |
|
Visualizing Cyber Security: Usable Workspaces |
|
Seeing is Believing: The Importance of Visualization in Real-World Machine Learning Applications |
|
Understanding the Dark Side: Malicious Intent |
|
Characterizing the Behavior of Cyber Adversaries: The Means, Motive, and Opportunity of Cyberattacks |
|
Self Adaptive High Interaction Honeypots Driven by Game Theory |
|
Blueprint for a Science of Cybersecurity |
|
Schneider on Security |
|
A Vision for Scalable Trustworthy Computing |
|
Cyber Clouds and Cloud Computing 101 |
|
Cloud Computing: Risks, Benefits, and Mission Enhancement for the Intelligence Community |
|
The Internet of Things: A Reality Check |
|