| Introduction to Visualization for Computer Security |
|
| Supporting the Cyber Analytic Process using Visual History on Large Displays |
|
| Information Visualization, Visual Data Mining, and Machine Learning |
|
| Cognitive Foundations for Visual Analytics |
|
| Perception Driven Techniques for the Effective Visualization of Large Volume Data |
|
| Interest Driven Navigation in Visualization |
|
| Visualization of Mined Pattern and Its Human Aspects |
|
| Exploring Ensemble Visualization |
|
| Towards Classifying and Selecting Appropriate Security Visualization Techniques |
|
| Nimble Cybersecurity Incident Management through Visualization and Defensible Recommendations |
|
| Isolated Virtualized Clusters: Testbeds for High-Risk Security Experimentation and Training |
|
| CERT Data Science in Cybersecurity Symposium 2018 |
|
| Visualizing Cyber Security: Usable Workspaces |
|
| Seeing is Believing: The Importance of Visualization in Real-World Machine Learning Applications |
|
| Understanding the Dark Side: Malicious Intent |
|
| Characterizing the Behavior of Cyber Adversaries: The Means, Motive, and Opportunity of Cyberattacks |
|
| Self Adaptive High Interaction Honeypots Driven by Game Theory |
|
| Blueprint for a Science of Cybersecurity |
|
| Schneider on Security |
|
| A Vision for Scalable Trustworthy Computing |
|
| Cyber Clouds and Cloud Computing 101 |
|
| Cloud Computing: Risks, Benefits, and Mission Enhancement for the Intelligence Community |
|
| The Internet of Things: A Reality Check |
|