The Community for Technology Leaders
2015 IEEE Symposium on Visualization for Cyber Security (VizSec) (2015)
Chicago, IL, USA
Oct. 25, 2015 to Oct. 25, 2015
ISBN: 978-1-4673-7598-6
TABLE OF CONTENTS

[Title page] (PDF)

pp. i

Committees (PDF)

pp. iv

Ocelot: user-centered design of a decision support visualization for network quarantine (Abstract)

Dustin L. Arendt , Pacific Northwest National Laboratory
Russ Burtner , Pacific Northwest National Laboratory
Daniel M. Best , Pacific Northwest National Laboratory
Nathan D. Bos , Johns Hopkins University Applied Physics Laboratory
John R. Gersh , Johns Hopkins University Applied Physics Laboratory
Christine D. Piatko , Johns Hopkins University Applied Physics Laboratory
Celeste Lyn Paul , Department of Defense
pp. 1-8

PERCIVAL: proactive and reactive attack and response assessment for cyber incidents using visual analytics (Abstract)

Marco Angelini , University of Rome "La Sapienza"
Nicolas Prigent , CentraleSupelec
Giuseppe Santucci , University of Rome "La Sapienza"
pp. 1-8

Visual analytics for cyber red teaming (Abstract)

Joseph Yuen , Automated Analytics and Decision Support, DST Group, Australia
Benjamin Turnbull , University of New South Wales ADFA, Australia
Justin Hernandez , Automated Analytics and Decision Support, DST Group, Australia
pp. 1-8

Ensemble visualization for cyber situation awareness of network security data (Abstract)

Lihua Hao , Department of Computer Science, North Carolina State University
Christopher G. Healey , Department of Computer Science, North Carolina State University
Steve E. Hutchinson , ICF International, U.S. Army Research Laboratory
pp. 1-8

A visual analytics loop for supporting model development (Abstract)

Simon Walton , Oxford University
Min Chen , Oxford University
pp. 1-8

SNAPS: Semantic network traffic analysis through projection and selection (Abstract)

Bram C.M. Cappers , Department of Mathematics and Computer Science, Eindhoven University of Technology, The Netherlands
Jarke J. van Wijk , Department of Mathematics and Computer Science, Eindhoven University of Technology, The Netherlands
pp. 1-8

Discovery of rating fraud with real-time streaming visual analytics (Abstract)

Kodzo Webga , University of North Carolina at Charlotte
Aidong Lu , University of North Carolina at Charlotte
pp. 1-8

Unlocking user-centered design methods for building cyber security visualizations (Abstract)

Sean Mckenna , University of Utah
Diane Staheli , MIT Lincoln Laboratory
Miriah Meyer , University of Utah
pp. 1-8

Visualizing the insider threat: challenges and tools for identifying malicious user activity (Abstract)

Philip A. Legg , Department of Computer Science and Creative Technologies, University of the West of England, Bristol, UK
pp. 1-7

Bitconeview: visualization of flows in the bitcoin transaction graph (Abstract)

Giuseppe Di Battista , Roma Tre University, Italy
Valentino Di Donato , Roma Tre University, Italy
Maurizio Patrignani , Roma Tre University, Italy
Maurizio Pizzonia , Roma Tre University, Italy
Vincenzo Roselli , Roma Tre University, Italy
Roberto Tamassia , Brown University, U.S.A.
pp. 1-8
87 ms
(Ver 3.3 (11022016))