Cyber situational awareness–a systematic review of the literature

U Franke, J Brynielsson - Computers & security, 2014 - Elsevier
Cyber situational awareness is attracting much attention. It features prominently in the
national cyber strategies of many countries, and there is a considerable body of research …

A survey of visualization systems for network security

H Shiravi, A Shiravi, AA Ghorbani - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Security Visualization is a very young term. It expresses the idea that common visualization
techniques have been designed for use cases that are not supportive of security-related …

Retrieval of relevant historical data triage operations in security operation centers

T Lin, C Zhong, J Yen, P Liu - From Database to Cyber Security: Essays …, 2018 - Springer
Triage analysis is a fundamental stage in cyber operations in Security Operations Centers
(SOCs). The massive data sources generate great demands on cyber security analysts' …

Design activity framework for visualization design

S McKenna, D Mazur, J Agutter… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
An important aspect in visualization design is the connection between what a designer does
and the decisions the designer makes. Existing design process models, however, do not …

Analysis framework of network security situational awareness and comparison of implementation methods

Y Li, G Huang, C Wang, Y Li - EURASIP Journal on Wireless …, 2019 - Springer
Abstract Information technology has penetrated into all aspects of politics, economy, and
culture of the whole society. The information revolution has changed the way of …

A cyber security data triage operation retrieval system

C Zhong, T Lin, P Liu, J Yen, K Chen - Computers & Security, 2018 - Elsevier
Data triage is a fundamental stage of cyber defense analysis for achieving cyber situational
awareness in a Security Operations Center (SOC). It has a high requirement for cyber …

Unlocking user-centered design methods for building cyber security visualizations

S McKenna, D Staheli, M Meyer - 2015 IEEE Symposium on …, 2015 - ieeexplore.ieee.org
User-centered design can aid visualization designers to build better, more practical tools
that meet the needs of cyber security users. The cyber security visualization research …

Bubblenet: A cyber security dashboard for visualizing patterns

S McKenna, D Staheli, C Fulcher… - Computer Graphics …, 2016 - Wiley Online Library
The field of cyber security is faced with ever‐expanding amounts of data and a constant
barrage of cyber attacks. Within this space, we have designed BubbleNet as a cyber security …

Analyzing content of tasks in Business Process Management. Blending task execution and organization perspectives

N Rizun, A Revina, VG Meister - Computers in Industry, 2021 - Elsevier
An efficient organization, management, and execution of tasks are central for the successful
functioning of any organization. This topic was on the research agenda already in the early …

Automate cybersecurity data triage by leveraging human analysts' cognitive process

C Zhong, J Yen, P Liu… - 2016 IEEE 2nd …, 2016 - ieeexplore.ieee.org
Security Operation Centers rely on data triage to identify the true" signals" from a large
volume of noisy alerts and" connect the dots" to answer certain higher-level questions about …