Title Date
Introduction to Visualization for Computer Security
Supporting the Cyber Analytic Process using Visual History on Large Displays
Information Visualization, Visual Data Mining, and Machine Learning
Cognitive Foundations for Visual Analytics
Perception Driven Techniques for the Effective Visualization of Large Volume Data
Interest Driven Navigation in Visualization
Visualization of Mined Pattern and Its Human Aspects
Exploring Ensemble Visualization
Towards Classifying and Selecting Appropriate Security Visualization Techniques
Nimble Cybersecurity Incident Management through Visualization and Defensible Recommendations
Isolated Virtualized Clusters: Testbeds for High-Risk Security Experimentation and Training
CERT Data Science in Cybersecurity Symposium 2018
Visualizing Cyber Security: Usable Workspaces
Seeing is Believing: The Importance of Visualization in Real-World Machine Learning Applications
Understanding the Dark Side: Malicious Intent
Characterizing the Behavior of Cyber Adversaries: The Means, Motive, and Opportunity of Cyberattacks
Self Adaptive High Interaction Honeypots Driven by Game Theory
Blueprint for a Science of Cybersecurity
Schneider on Security
A Vision for Scalable Trustworthy Computing
Cyber Clouds and Cloud Computing 101
Cloud Computing: Risks, Benefits, and Mission Enhancement for the Intelligence Community
The Internet of Things: A Reality Check