Multiple workspaces in visual analytics

M El Meseery, Y Wu… - … Symposium on Big Data …, 2018 - ieeexplore.ieee.org
Exploratory visual analysis is an iterative process, where analysts often start from an
overview of the data. Subsequently, they often pursue different hypotheses through multiple …

Multi-aspect visual analytics on large-scale high-dimensional cyber security data

VY Chen, AM Razip, S Ko, CZ Qian… - Information …, 2015 - journals.sagepub.com
In this article, we present a visual analytics system, SemanticPrism, which aims to analyze
large-scale high-dimensional cyber security datasets containing logs of a million computers …

A survey of visual analytics techniques and applications: State-of-the-art research and future challenges

GD Sun, YC Wu, RH Liang, SX Liu - Journal of Computer Science and …, 2013 - Springer
Visual analytics employs interactive visualizations to integrate users' knowledge and
inference capability into numerical/algorithmic data analysis processes. It is an active …

[PDF][PDF] Applicability of visual analytics to defence and security operations

V Lavigne, D Gouin - … Command and Control “Collective C2 in …, 2011 - researchgate.net
In the context of modern defence and security operations, analysts are faced with a
continuously growing set of information of different nature which causes significant …

The scalable reasoning system: lightweight visualization for distributed analytics

W Pike, J Bruce, B Baddeley, D Best… - Information …, 2009 - journals.sagepub.com
A central challenge in visual analytics is the creation of accessible, widely distributable
analysis applications that bring the benefits of visual discovery to as broad a user base as …

Analysis of visualization systems for cyber security

H Zhao, W Tang, X Zou, Y Wang, Y Zu - Recent Developments in Intelligent …, 2019 - Springer
Cyber security visualization is becoming a hot research field. Visualization and interactive
analysis can greatly help network managers and analysts monitor network, detect …

Visualization techniques for computer network defense

JM Beaver, CA Steed, RM Patton… - … , and Intelligence (C3I …, 2011 - spiedigitallibrary.org
Effective visual analysis of computer network defense (CND) information is challenging due
to the volume and complexity of both the raw and analyzed network data. A typical CND is …

Big Data and Cyber security: A visual Analytics perspective

S Mazumdar, J Wang - Guide to Vulnerability Analysis for Computer …, 2018 - Springer
With organisations and governments significantly investing in cyber defenses, there is an
urgent need to develop tools and technologies to help security professionals understand …

Constructive Visualization: A token-based paradigm allowing to assemble dynamic visual representation for non-experts

S Huron - 2014 - theses.hal.science
During the past two decades, information visualisation (InfoVis) research has created new
techniques and methods to support data-intensive analyses in science, industry and …

LEVA: Using large language models to enhance visual analytics

Y Zhao, Y Zhang, Y Zhang, X Zhao… - … on Visualization and …, 2024 - ieeexplore.ieee.org
Visual analytics supports data analysis tasks within complex domain problems. However,
due to the richness of data types, visual designs, and interaction designs, users need to …