A review of attack graph and attack tree visual syntax in cyber security

HS Lallie, K Debattista, J Bal - Computer Science Review, 2020 - Elsevier
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …

Counterattacking cyber threats: A framework for the future of cybersecurity

MF Safitra, M Lubis, H Fakhrurroja - Sustainability, 2023 - mdpi.com
Amidst the rapid advancements in the digital landscape, the convergence of digitization and
cyber threats presents new challenges for organizational security. This article presents a …

Systematic literature review on cyber situational awareness visualizations

L Jiang, A Jayatilaka, M Nasim, M Grobler… - Ieee …, 2022 - ieeexplore.ieee.org
The dynamics of cyber threats are increasingly complex, making it more challenging than
ever for organizations to obtain in-depth insights into their cyber security status. Therefore …

[图书][B] Applied attention theory

CD Wickens, JS McCarley, RS Gutzwiller - 2022 - taylorfrancis.com
Applied Attention Theory, Second Edition provides details concerning the relevance of all
aspects of attention to the world beyond the laboratory. Topic application areas include the …

Bitconeview: visualization of flows in the bitcoin transaction graph

G Di Battista, V Di Donato, M Patrignani… - … IEEE symposium on …, 2015 - ieeexplore.ieee.org
Bitcoin is a digital currency whose transactions are stored into a public ledger, called
blockchain, that can be viewed as a directed graph with more than 70 million nodes, where …

CRUSOE: A toolset for cyber situational awareness and decision support in incident handling

M Husák, L Sadlek, S Špaček, M Laštovička… - Computers & …, 2022 - Elsevier
The growing size and complexity of today's computer network make it hard to achieve and
maintain so-called cyber situational awareness, ie, the ability to perceive and comprehend …

Interactive three-dimensional visualization of network intrusion detection data for machine learning

W Zong, YW Chow, W Susilo - Future Generation Computer Systems, 2020 - Elsevier
The threat of cyber-attacks is on the rise in the digital world today. As such, effective
cybersecurity solutions are becoming increasingly important for detecting and combating …

Unlocking user-centered design methods for building cyber security visualizations

S McKenna, D Staheli, M Meyer - 2015 IEEE Symposium on …, 2015 - ieeexplore.ieee.org
User-centered design can aid visualization designers to build better, more practical tools
that meet the needs of cyber security users. The cyber security visualization research …

Bubblenet: A cyber security dashboard for visualizing patterns

S McKenna, D Staheli, C Fulcher… - Computer Graphics …, 2016 - Wiley Online Library
The field of cyber security is faced with ever‐expanding amounts of data and a constant
barrage of cyber attacks. Within this space, we have designed BubbleNet as a cyber security …

The human factors of cyber network defense

RS Gutzwiller, S Fugate, BD Sawyer… - Proceedings of the …, 2015 - journals.sagepub.com
Technology's role in the fight against malicious cyber-attacks is critical to the increasingly
networked world of today. Yet, technology does not exist in isolation: the human factor is an …