Citation: | ZHONG Zengsheng, ZHAO Ying, SHI Ronghua, et al., “A User-Centered Multi-space Collaborative Visual Analysis for Cyber Security,” Chinese Journal of Electronics, vol. 27, no. 5, pp. 910-919, 2018, doi: 10.1049/cje.2017.09.021 |
Shiravi, H, A. Shiravi and A. A. Ghorbani, “A survey of visualization systems for network security”, IEEE Transactions on Visualization & Computer Graphics, Vol.18, No.8, pp.1313-1329.
|
Zhao Ying, Fan Xiaoping, Zhou Fangfang, et al., “A survey on network security data visualization”, Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of Computer-Aided Design and Computer Graphics, Vol.26, No.5, pp.687-697, 2014. (in Chinese)
|
Diane Staheli, Tamara Yu, R. Jordan Crouser, et al., “Visualization evaluation for cyber security: Trends and future directions”, Eleventh Workshop on Visualization for Cyber Security ACM, Paris, France, pp.49-56, 2014.
|
Mckenna Sean, D. Staheli and M. Meyer, “Unlocking usercentered design methods for building cyber security visualizations”, Visualization for Cyber Security IEEE, Chicago, Illinois, USA, pp.1-8, 2015.
|
Greenberg, Saul and B. Buxton, “Usability evaluation considered harmful (some of the time)”, Sigchi Conference on Human Factors in Computing Systems ACM, Florence, Italy, pp.111-120, 2008
|
Tobias Isenberg, Petra Isenberg and Jian Chen, “A systematic review on the practice of evaluating visualization”, IEEE Transactions on Visualization & Computer Graphics, Vol.19, No.12, pp.2818-2827, 2013.
|
Plaisant Catherine, “The challenge of information visualization evaluation”, Working Conference on Advanced Visual Interfaces ACM, Gallipoli, Italy, pp.109-116, 2004.
|
Zhang Yanping, Xiao Yang, Chen Min, et al., “A survey of security visualization for computer network logs”, Security & Communication Networks, Vol.5, No.4, pp.404-421, 2012.
|
Koike Hideki, K. Ohno and K. Koizumi, “Visualizing cyber attacks using IP matrix”, IEEE Workshops on Visualization for Computer Security IEEE Computer Society, Minneapolis, Minnesota, USA, pp.91-98, 2005.
|
Zhou Fangfang, Huang Wei and Zhao Ying, “ENTVis: A visual analytic tool for entropy-based network traffic anomaly detection”, IEEE Computer Graphics and Applications, Vol.35, No.6, pp.42-50, 2015.
|
Kohara, Masayoshi, Y. Hori, and K. Sakurai, “Interactively combining 2D and 3D visualization for network traffic monitoring”, International Workshop on Visualization for Computer Security ACM, Alexandria, Virginia, USA, pp.123-127, 2006.
|
Mansmann Florian, Rexroad Brain, C. North Stephen, et al., “Visual analysis of network traffic for resource planning, interactive monitoring, and interpretation of security threats”, IEEE Transactions on Visualization & Computer Graphics, Vol.13, No.6, pp.1105-1112, 2007.
|
Fabian Fischer, Johannes Fuchs, Florian Mansmann, et al., “BANKSAFE: Visual analytics for big data in large-scale computer networks”, Information Visualization, Vol.14, No.1, pp.51-61, 2015.
|
Zhao Ying, Liang Xing, Fan Xiaoping, et al., “MVSec: Multiperspective and deductive visual analytics on heterogeneous network security data”, Journal of Visualization, Vol.17, No.3, pp.181-196, 2014.
|
Q. Liao, L. Shi and C. Wang, “Visual analysis of large-scale network anomalies”, IBM Journal of Research and Development, Vol.57, No.3/4, pp.13:1-13:2, 2013.
|
Priya Mahadevan, Dmitri Krioukov, Kevin Fall, et al., “Systematic topology analysis and generation using degree correlations”, In SIGCOMM, Pisa, Italy, Vol.36, No.4, pp.135-146, 2006.
|
Lei Shi, Qi Liao and Yuan He, “SAVE: Sensor anomaly visualization engine”, Visual Analytics Science and Technology IEEE, Providence, Rhode Island, USA, pp.201—210, 2011.
|
Gray Cameron C., P. D. Ritsos and J. C. Robertsz, “Contextual network navigation to provide situational awareness for network administrators”, Visualization for Cyber Security IEEE, Chicago, Illinois, USA, pp.1-8, 2015.
|
Dustin L. Arendt, Russ Burtner, Daniel M., et al., “Ocelot: User-centered design of a decision support visualization for network quarantine”, Visualization for Cyber Security (VizSec), 2015 IEEE Symposium, Chicago, Illinois, USA, pp.1-8, 2015.
|
Shelly David, Dunlop Matthew, Marchany Randy, et al., “Using geographic information systems for enhanced network security visualization”, International Conference and Exhibition on Computing for Geospatial Research & Application, Com.geo 2010, Washington, DC, USA, pp.1-8, 2010.
|
Fowler J. Joseph, Johnson Thienne, Simonetto Paolo, et al., “IMap: Visualizing network activity over internet maps”, Eleventh Workshop on Visualization for Cyber Security ACM, Paris, France, pp.80-87, 2014.
|
Cook K, Grinstein G and Whiting M, “The VAST Challenge: History, scope, and outcomes: An introduction to the special issue”, Information Visualization, Vol.13, No.4, pp.301-312, 2014.
|
Shi Ronghua, Yang Mengjie, Zhao Ying, et al., “A matrix-based visualization system for network traffic forensics”, IEEE Systems Journal, Vol.10, No.4, pp.1350-1360, 2016.
|
Zhao Ying, Zhou Fangfang, Fan Xiaoping, et al., “IDSRadar: A real-time visualization framework for IDS alerts”, Science China, Vol.56, No.8, pp.1-12, 2013.
|