-
2
-
-
80053614786
-
Visualization of time-oriented data
-
Springer, 13
-
AIGNER W., MIKSCH S., SCHUMANN H., TOMINSKI C.: Visualization of time-oriented data. Human-computer interaction series. Springer, 2011. 10, 12, 13
-
(2011)
Human-computer interaction series
, vol.10
, Issue.12
-
-
AIGNER, W.1
MIKSCH, S.2
SCHUMANN, H.3
TOMINSKI, C.4
-
3
-
-
0000974551
-
Plots of high-dimensional data
-
ANDREWS D. F.: Plots of high-dimensional data. Biometrics 28, 1 (1972), 125-136. doi:10.2307/2528964. 11
-
(1972)
Biometrics
, vol.28
, Issue.1
, pp. 125-136
-
-
ANDREWS, D. F.1
-
4
-
-
84869822279
-
Improving malware classification: Bridging the static/dynamic gap
-
ACM, 7, 10, 11, 12, 13, 14, 15, 16
-
ANDERSON B., STORLIE C., LANE T.: Improving malware classification: Bridging the static/dynamic gap. In Proc. 5th ACM Workshop on Security and Artificial Intelligence, AISec (2012), ACM, pp. 3-14. doi:10.1145/2381896. 2381900. 6, 7, 10, 11, 12, 13, 14, 15, 16
-
(2012)
Proc. 5th ACM Workshop on Security and Artificial Intelligence, AISec
, pp. 3-14
-
-
ANDERSON, B.1
STORLIE, C.2
LANE, T.3
-
5
-
-
85123313027
-
-
AUTOIT CONSULTING LTD.:. [online]. [cited 2014-12-29]. 5
-
AUTOIT CONSULTING LTD.:. Autoit [online]. 2014. URL: https://www.autoitscript.com/site/autoit/ [cited 2014-12-29]. 5
-
(2014)
Autoit
-
-
-
6
-
-
85023621342
-
-
[online]. [cited 2014-12-29]. 5
-
BATRA R.:. API Monitor [online]. 2014. URL: http://www.rohitab.com/apimonitor [cited 2014-12-29]. 5
-
(2014)
API Monitor
-
-
BATRA, R.1
-
7
-
-
80053510589
-
Surveying port scans and their detection methodologies
-
(Oct)
-
BHUYAN M. H., BHATTACHARYYA D., KALITA J.: Surveying port scans and their detection methodologies. The Computer Journal 54, 10 (Oct. 2011), 1565-1581. doi:10. 1093/comjnl/bxr035. 3
-
(2011)
The Computer Journal
, vol.54
, Issue.10
, pp. 1565-1581
-
-
BHUYAN, M. H.1
BHATTACHARYYA, D.2
KALITA, J.3
-
8
-
-
85063636742
-
QEMU, a fast and portable dynamic translator
-
ATEC USENIX Association, Berkeley, CA, USA, 3, 5
-
BELLARD F.: QEMU, a fast and portable dynamic translator. In Proc. USENIX Annual Technical Conf., ATEC (2005), USENIX Association, Berkeley, CA, USA, pp. 41-46. 3, 5
-
(2005)
Proc. USENIX Annual Technical Conf
, pp. 41-46
-
-
BELLARD, F.1
-
9
-
-
84906780715
-
Cyber scanning: A comprehensive survey
-
BOU-HARB E., DEBBABI M., ASSI C.: Cyber scanning: A comprehensive survey. IEEE Communications Surveys Tutorials 16, 3 (2014), 1496-1519. doi:10.1109/SURV. 2013.102913.00020. 3
-
(2014)
IEEE Communications Surveys Tutorials
, vol.16
, Issue.3
, pp. 1496-1519
-
-
BOU-HARB, E.1
DEBBABI, M.2
ASSI, C.3
-
10
-
-
84888622633
-
A survey on heuristic malware detection techniques
-
BAZRAFSHAN Z., HASHEMI H., FARD S., HAMZEH A.: A survey on heuristic malware detection techniques. In 5th Conf. Information and Knowledge Technology, IKT (2013), pp. 113-120. doi:10.1109/IKT.2013.6620049. 2, 17
-
(2013)
5th Conf. Information and Knowledge Technology, IKT
, pp. 113-120
-
-
BAZRAFSHAN, Z.1
HASHEMI, H.2
FARD, S.3
HAMZEH, A.4
-
13
-
-
33748932391
-
Dynamic analysis of malicious code
-
5
-
BAYER U., MOSER A., KRUEGEL C., KIRDA E.: Dynamic analysis of malicious code. Journal in Computer Virology 2, 1 (2006), 67-77. 5
-
(2006)
Journal in Computer Virology
, vol.2
, Issue.1
, pp. 67-77
-
-
BAYER, U.1
MOSER, A.2
KRUEGEL, C.3
KIRDA, E.4
-
14
-
-
56449110617
-
Visual reverse engineering of binary and data files
-
Goodall J. R., Conti G., Ma K.-L., (Eds), LNCS 5210, Springer, 7, 8, 11, 12, 13, 14, 15, 16
-
CONTI G., DEAN E., SINDA M., SANGSTER B.: Visual reverse engineering of binary and data files. In Visualization for Computer Security, Proc. VizSec (2008), Goodall J. R., Conti G., Ma K.-L., (Eds.), LNCS 5210, Springer, pp. 1-17. doi:10.1007/978-3-540-85933-8_1. 7, 8, 11, 12, 13, 14, 15, 16
-
(2008)
Visualization for Computer Security, Proc. VizSec
, pp. 1-17
-
-
CONTI, G.1
DEAN, E.2
SINDA, M.3
SANGSTER, B.4
-
15
-
-
84949331034
-
The use of faces to represent points in k-dimensional space graphically
-
CHERNOFF H.: The use of faces to represent points in k-dimensional space graphically. Journal of the American Statistical Association 68, 342 (1973), 361-368. doi:10.1080/01621459.1973.10482434. 11
-
(1973)
Journal of the American Statistical Association
, vol.68
, Issue.342
, pp. 361-368
-
-
CHERNOFF, H.1
-
18
-
-
84903588741
-
Malicious behavior patterns
-
5, 17
-
DORNHACKL H., KADLETZ K., LUH R., TAVOLATO P.: Malicious behavior patterns. In Proc. IEEE 8th Int. Symp. Service Oriented System Engineering (2014), pp. 384-389. doi: 10.1109/SOSE.2014.52. 1, 5, 17
-
(2014)
Proc. IEEE 8th Int. Symp. Service Oriented System Engineering
, pp. 384-389
-
-
DORNHACKL, H.1
KADLETZ, K.2
LUH, R.3
TAVOLATO, P.4
-
19
-
-
84883355948
-
Visualization techniques for efficient malware detection
-
7, 8, 11, 12, 13, 14, 15, 16
-
DONAHUE J., PATURI A., MUKKAMALA S.: Visualization techniques for efficient malware detection. In Proc. 2013 IEEE Int. Conf. Intelligence and Security Informatics, ISI (2013), pp. 289-291. doi:10.1109/ISI.2013.6578845. 7, 8, 11, 12, 13, 14, 15, 16
-
(2013)
Proc. 2013 IEEE Int. Conf. Intelligence and Security Informatics, ISI
, pp. 289-291
-
-
DONAHUE, J.1
PATURI, A.2
MUKKAMALA, S.3
-
20
-
-
84910089488
-
Nmap: A novel neighborhood preservation space-filling algorithm
-
DUARTE F., SIKANSI F., FATORE F., FADEL S., PAULOVICH F.: Nmap: A novel neighborhood preservation space-filling algorithm. IEEE Transactions on Visualization and Computer Graphics 20, 12 (2014), 2063-2071. doi:10. 1109/TVCG.2014.2346276. 11
-
(2014)
IEEE Transactions on Visualization and Computer Graphics
, vol.20
, Issue.12
, pp. 2063-2071
-
-
DUARTE, F.1
SIKANSI, F.2
FATORE, F.3
FADEL, S.4
PAULOVICH, F.5
-
21
-
-
84858392040
-
A survey on automated dynamic malware-analysis techniques and tools
-
EGELE M., SCHOLTE T., KIRDA E., KRUEGEL C.: A survey on automated dynamic malware-analysis techniques and tools. ACM Computing Surveys 44, 2 (2012), 6:1-6:42. doi: 10.1145/2089125.2089126. 2, 3
-
(2012)
ACM Computing Surveys
, vol.44
, Issue.2
, pp. 6:1-6:42
-
-
EGELE, M.1
SCHOLTE, T.2
KIRDA, E.3
KRUEGEL, C.4
-
22
-
-
80755181021
-
A survey of mobile malware in the wild
-
ACM
-
FELT A. P., FINIFTER M., CHIN E., HANNA S., WAGNER D.: A survey of mobile malware in the wild. In Proc. 1st ACM Workshop on Security and Privacy in Smart-phones and Mobile Devices, SPSM (2011), ACM, pp. 3-14. doi:10.1145/2046614.2046618. 3
-
(2011)
Proc. 1st ACM Workshop on Security and Privacy in Smart-phones and Mobile Devices, SPSM
, pp. 3-14
-
-
FELT, A. P.1
FINIFTER, M.2
CHIN, E.3
HANNA, S.4
WAGNER, D.5
-
24
-
-
85123280566
-
-
FIREEYE INC.:. [online]. [cited 2014-12-29]. 5
-
FIREEYE INC.:. FireEye malware analysis [online]. 2014. URL: https://www.fireeye.com/products/malware-analysis.html [cited 2014-12-29]. 5
-
(2014)
FireEye malware analysis
-
-
-
25
-
-
84863928210
-
Interactive, visual-aided tools to analyze malware behavior
-
Springer, 8, 11, 12, 13, 14, 15, 16
-
GRÉGIO A. R. A., BARUQUE A. O. C., AFONSO V. M., FILHO D. S. F., GEUS P. L. D., JINO M., SANTOS R. D. C. D.: Interactive, visual-aided tools to analyze malware behavior. In Computational Science and Its Applications, ICCSA, LNCS 7336. Springer, 2012, pp. 302-313. doi:10.1007/978-3-642-31128-4_22. 7, 8, 11, 12, 13, 14, 15, 16
-
(2012)
Computational Science and Its Applications, ICCSA, LNCS 7336
, pp. 302-313
-
-
GRÉGIO, A. R. A.1
BARUQUE, A. O. C.2
AFONSO, V. M.3
FILHO, D. S. F.4
GEUS, P. L. D.5
JINO, M.6
SANTOS, R. D. C. D.7
-
27
-
-
84926427148
-
Survey of virtual machine research
-
3
-
GOLDBERG R. P.: Survey of virtual machine research. Computer 7, 6 (1974), 34-45. 3
-
(1974)
Computer
, vol.7
, Issue.6
, pp. 34-45
-
-
GOLDBERG, R. P.1
-
28
-
-
79960106015
-
Visualization techniques for malware behavior analysis
-
SPIE, 801905:9. 7, 8, 11, 12, 13, 14, 15, 16
-
GRÉGIO A. R. A., SANTOS R. D. C.: Visualization techniques for malware behavior analysis. In Proc. Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense X (2011), vol. 8019, SPIE, pp. 801905:1-801905:9. doi:10. 1117/12.883441. 7, 8, 11, 12, 13, 14, 15, 16
-
(2011)
Proc. Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense X
, vol.8019
, pp. 801905:1
-
-
GRÉGIO, A. R. A.1
SANTOS, R. D. C.2
-
29
-
-
84982844941
-
SEEM: A scalable visualization for comparing multiple large sets of attributes for malware analysis
-
ACM. 7, 8, 9, 11, 12, 13, 14, 15, 16
-
GOVE R., SAXE J., GOLD S., LONG A., BERGAMO G.: SEEM: A scalable visualization for comparing multiple large sets of attributes for malware analysis. In Proc. 11th Workshop on Visualization for Cyber Security, VizSec (2014), ACM. doi: 10.1145/2671491.2671496. 7, 8, 9, 11, 12, 13, 14, 15, 16
-
(2014)
Proc. 11th Workshop on Visualization for Cyber Security, VizSec
-
-
GOVE, R.1
SAXE, J.2
GOLD, S.3
LONG, A.4
BERGAMO, G.5
-
30
-
-
84929049043
-
Malware analysis using visualized image matrices
-
6, 7, 10, 11, 12, 13, 14, 15, 16
-
HAN K., KANG B., IM E. G.: Malware analysis using visualized image matrices. The Scientific World Journal 2014 (2014), 15. doi:10.1155/2014/132713. 6, 7, 10, 11, 12, 13, 14, 15, 16
-
(2014)
The Scientific World Journal
, vol.2014
, pp. 15
-
-
HAN, K.1
KANG, B.2
IM, E. G.3
-
31
-
-
84891431181
-
Malware analysis method using visualization of binary files
-
6, 7, 10, 11, 12, 13, 14, 15, 16
-
HAN K., LIM J. H., IM E. G.: Malware analysis method using visualization of binary files. In Proc. Research in Adaptive and Convergent Systems, RACS (2013), pp. 317-321. doi:10. 1145/2513228.2513294. 6, 7, 10, 11, 12, 13, 14, 15, 16
-
(2013)
Proc. Research in Adaptive and Convergent Systems, RACS
, pp. 317-321
-
-
HAN, K.1
LIM, J. H.2
IM, E. G.3
-
32
-
-
84910010286
-
Malware analysis using visualized images and entropy graphs
-
6, 7, 9, 11, 12, 13, 14, 15, 16
-
HAN K. S., LIM J. H., KANG B., IM E. G.: Malware analysis using visualized images and entropy graphs. Int. Journal of Information Security (2014), 1-14. doi:10.1007/s10207-014-0242-0. 6, 7, 9, 11, 12, 13, 14, 15, 16
-
(2014)
Int. Journal of Information Security
, pp. 1-14
-
-
HAN, K. S.1
LIM, J. H.2
KANG, B.3
IM, E. G.4
-
34
-
-
34047172962
-
API hooking revealed
-
IVANOV I.: API hooking revealed. The Code Project (2002). 5
-
(2002)
The Code Project
, pp. 5
-
-
IVANOV, I.1
-
35
-
-
85123287317
-
-
[online]. [cited 2014-12-29]. 5
-
JOE SECURITY LLC:. JoeSandbox [online]. 2014. URL: http://www.joesecurity.org [cited 2014-12-29]. 5
-
(2014)
JoeSandbox
-
-
-
36
-
-
0036264672
-
Information visualization and visual data mining
-
10, 11, 12
-
KEIM D.: Information visualization and visual data mining. IEEE Transactions on Visualization and Computer Graphics 8, 1 (2002), 1-8. doi:10.1109/2945.981847. 10, 11, 12
-
(2002)
IEEE Transactions on Visualization and Computer Graphics
, vol.8
, Issue.1
, pp. 1-8
-
-
KEIM, D.1
-
37
-
-
79952949331
-
Mastering the information age: solving problems with visual analytics
-
(Eds)
-
KEIM D., KOHLHAMMER J., ELLIS G., MANSMANN F. (Eds.): Mastering the information age: solving problems with visual analytics. Eurographics Association, 2010. 1, 17
-
(2010)
Eurographics Association
, vol.1
, pp. 17
-
-
KEIM, D.1
KOHLHAMMER, J.2
ELLIS, G.3
MANSMANN, F.4
-
39
-
-
84885661346
-
Image visualization based malware detection
-
7, 9, 11, 12, 13, 14, 15, 16
-
KANCHERLA K., MUKKAMALA S.: Image visualization based malware detection. In Proc. 2013 IEEE Symp. Computational Intelligence in Cyber Security, CICS (2013), pp. 40-44. doi:10.1109/CICYBS.2013.6597204. 7, 9, 11, 12, 13, 14, 15, 16
-
(2013)
Proc. 2013 IEEE Symp. Computational Intelligence in Cyber Security, CICS
, pp. 40-44
-
-
KANCHERLA, K.1
MUKKAMALA, S.2
-
40
-
-
50249164320
-
Visual Analytics: Scope and challenges
-
Simoff S. J., Böhlen M. H., Mazeika A., (Eds), LNCS 4404. Springer, Berlin
-
KEIM D. A., MANSMANN F., SCHNEIDEWIND J., THOMAS J., ZIEGLER H.: Visual Analytics: Scope and challenges. In Visual Data Mining, Simoff S. J., Böhlen M. H., Mazeika A., (Eds.), LNCS 4404. Springer, Berlin, 2008, pp. 76-90. doi:10.1007/978-3-540-71080-6_6. 14
-
(2008)
Visual Data Mining
, pp. 76-90
-
-
KEIM, D. A.1
MANSMANN, F.2
SCHNEIDEWIND, J.3
THOMAS, J.4
ZIEGLER, H.5
-
41
-
-
84957802402
-
-
[online]. [cited 2014-12-29]. 3
-
LINUX FOUNDATION:. Xen project [online]. 2014. URL: http://www.xenproject.org [cited 2014-12-29]. 3
-
(2014)
Xen project
-
-
-
42
-
-
33749065750
-
Exploring highly structured data: a comparative study of stardinates and parallel coordinates
-
LANZENBERGER M., MIKSCH S., POHL M.: Exploring highly structured data: a comparative study of stardinates and parallel coordinates. In Proc. Int. Conf. Information Visualisation (2005), pp. 312-320. doi:10.1109/IV.2005.49. 11
-
(2005)
Proc. Int. Conf. Information Visualisation
, pp. 312-320
-
-
LANZENBERGER, M.1
MIKSCH, S.2
POHL, M.3
-
43
-
-
84982795820
-
Detecting malware samples with similar image sets
-
ACM. 7, 8, 11, 12, 13, 14, 15, 16
-
LONG A., SAXE J., GOVE R.: Detecting malware samples with similar image sets. In Proc. 11th Workshop on Visualization for Cyber Security, VizSec (2014), ACM. doi: 10.1145/2671491.2671500. 7, 8, 11, 12, 13, 14, 15, 16
-
(2014)
Proc. 11th Workshop on Visualization for Cyber Security, VizSec
-
-
LONG, A.1
SAXE, J.2
GOVE, R.3
-
44
-
-
79960209095
-
A study on malicious codes pattern analysis using visualization
-
LEE D., SONG I. S., KIM K., JEONG J.-H.: A study on malicious codes pattern analysis using visualization. In Proc. Int. Conf. Information Science and Applications, ICISA (2011), pp. 1-5. doi:10.1109/ICISA.2011.5772330. 1, 17
-
(2011)
Proc. Int. Conf. Information Science and Applications, ICISA
, pp. 1-5
-
-
LEE, D.1
SONG, I. S.2
KIM, K.3
JEONG, J.-H.4
-
46
-
-
84889811840
-
A matter of time: Applying a data-users-tasks design triangle to visual analytics of time-oriented data
-
MIKSCH S., AIGNER W.: A matter of time: Applying a data-users-tasks design triangle to visual analytics of time-oriented data. Computers & Graphics 38 (2014), 286-290. doi:10.1016/j.cag.2013.11.002. 17
-
(2014)
Computers & Graphics
, vol.38
, pp. 286-290
-
-
MIKSCH, S.1
AIGNER, W.2
-
48
-
-
84910028061
-
Opening the black box: Strategies for increased user involvement in existing algorithm implementations
-
MÜHLBACHER T., PIRINGER H., GRATZL S., SEDLMAIR M., STREIT M.: Opening the black box: Strategies for increased user involvement in existing algorithm implementations. IEEE Transactions on Visualization and Computer Graphics 20, 12 (2014), 1643-1652. doi:10.1109/TVCG.2014. 2346578. 17
-
(2014)
IEEE Transactions on Visualization and Computer Graphics
, vol.20
, Issue.12
, pp. 1643-1652
-
-
MÜHLBACHER, T.1
PIRINGER, H.2
GRATZL, S.3
SEDLMAIR, M.4
STREIT, M.5
-
49
-
-
85115136585
-
-
A K Peters Ltd, Boca Raton, 10, 15, 16, 17
-
MUNZNER T.: Visualization Analysis and Design. A K Peters Ltd, Boca Raton, 2014. 10, 15, 16, 17
-
(2014)
Visualization Analysis and Design
-
-
MUNZNER, T.1
-
50
-
-
80052297905
-
Malware images: Visualization and automatic classification
-
ACM, 4:1-4:7. 7, 9, 11, 12, 13, 14, 15, 16
-
NATARAJ L., KARTHIKEYAN S., JACOB G., MANJUNATH B. S.: Malware images: Visualization and automatic classification. In Proc. 8th Int. Symp. Visualization for Cyber Security, VizSec (2011), ACM, pp. 4:1-4:7. doi:10.1145/2016904.2016908. 7, 9, 11, 12, 13, 14, 15, 16
-
(2011)
Proc. 8th Int. Symp. Visualization for Cyber Security, VizSec
-
-
NATARAJ, L.1
KARTHIKEYAN, S.2
JACOB, G.3
MANJUNATH, B. S.4
-
51
-
-
80955131340
-
A comparative assessment of malware classification using binary texture analysis and dynamic analysis
-
NATARAJ L., YEGNESWARAN V., PORRAS P., ZHANG J.: A comparative assessment of malware classification using binary texture analysis and dynamic analysis. In Proc. 4th ACM Workshop on Security and Artificial Intelligence, AISec (2011), pp. 21-30. doi:10.1145/2046684.2046689. 9
-
(2011)
Proc. 4th ACM Workshop on Security and Artificial Intelligence, AISec
, pp. 21-30
-
-
NATARAJ, L.1
YEGNESWARAN, V.2
PORRAS, P.3
ZHANG, J.4
-
52
-
-
85123297400
-
-
[online]. [cited 2014-12-29]. 3
-
ORACLE CORPORATION:. Oracle VirtualBox [online]. 2014. URL: https://www.virtualbox.org [cited 2014-12-29]. 3
-
(2014)
Oracle VirtualBox
-
-
-
53
-
-
63149084618
-
Signature visualization of software binaries
-
7, 9, 11, 12, 13, 14, 15, 16
-
PANAS T.: Signature visualization of software binaries. In Proc. 4th ACM Symp. Software Visualization, SoftVis (2008), pp. 185-188. doi:10.1145/1409720.1409749. 6, 7, 9, 11, 12, 13, 14, 15, 16
-
(2008)
Proc. 4th ACM Symp. Software Visualization, SoftVis
, pp. 185-188
-
-
PANAS, T.1
-
55
-
-
84883273437
-
Mobile malware visual analytics and similarities of attack toolkits (malware gene analysis)
-
7, 10, 11, 12, 13, 14, 15, 16
-
PATURI A., CHERUKURI M., DONAHUE J., MUKKAMALA S.: Mobile malware visual analytics and similarities of attack toolkits (malware gene analysis). In Proc. Int. Conf. Collaboration Technologies and Systems, CTS (2013), pp. 149-154. doi:10.1109/CTS.2013.6567221. 7, 10, 11, 12, 13, 14, 15, 16
-
(2013)
Proc. Int. Conf. Collaboration Technologies and Systems, CTS
, pp. 149-154
-
-
PATURI, A.1
CHERUKURI, M.2
DONAHUE, J.3
MUKKAMALA, S.4
-
56
-
-
0024175034
-
Iconographic displays for visualizing multidimensional data
-
PICKETT R., GRINSTEIN G.: Iconographic displays for visualizing multidimensional data. In Proc. 1988 IEEE Int. Conf. Systems, Man, and Cybernetics (1998), vol. 1, pp. 514-519. doi:10.1109/ICSMC.1988.754351. 11
-
(1998)
Proc. 1988 IEEE Int. Conf. Systems, Man, and Cybernetics
, vol.1
, pp. 514-519
-
-
PICKETT, R.1
GRINSTEIN, G.2
-
57
-
-
77949357077
-
Visualizing compiled executables for malware analysis
-
6, 7, 8, 11, 12, 13, 14, 15, 16
-
QUIST D., LIEBROCK L.: Visualizing compiled executables for malware analysis. In Proc. 6th Int. Workshop on Visualization for Cyber Security, VizSec (2009), pp. 27-32. doi: 10.1109/VIZSEC.2009.5375539. 6, 7, 8, 11, 12, 13, 14, 15, 16
-
(2009)
Proc. 6th Int. Workshop on Visualization for Cyber Security, VizSec
, pp. 27-32
-
-
QUIST, D.1
LIEBROCK, L.2
-
58
-
-
80054806009
-
Reversing compiled executables for malware analysis via visualization
-
7, 8, 11, 12, 13, 14, 15, 16
-
QUIST D. A., LIEBROCK L. M.: Reversing compiled executables for malware analysis via visualization. Information Visualization 10, 2 (2011), 117-126. doi:10.1057/ivs. 2010.11. 6, 7, 8, 11, 12, 13, 14, 15, 16
-
(2011)
Information Visualization
, vol.10
, Issue.2
, pp. 117-126
-
-
QUIST, D. A.1
LIEBROCK, L. M.2
-
59
-
-
85123288436
-
-
[online]. [cited 2014-12-29]. 5
-
RUSSINOVICH M., COGSWELL B.:. Process monitor v3.1 [online]. 2014. URL: http://technet.microsoft.com/en-us/sysinternals/bb896645.aspx [cited 2014-12-29]. 5
-
(2014)
Process monitor v3.1
-
-
RUSSINOVICH, M.1
COGSWELL, B.2
-
60
-
-
85123298923
-
-
[online]. [cited 2015-04-07]. 6
-
[online]. 2015. URL: https://www.zotero.org/support/dev/web_api/v3/basics [cited 2015-04-07]. 6
-
(2015)
-
-
-
61
-
-
79955688744
-
-
6th ed. Microsoft Press, 4, 5
-
RUSSINOVICH M., SOLOMON D., IONESCU A.: Windows Internals, Part 1: Covering Windows Server 2008 R2 and Windows 7, 6th ed. Microsoft Press, 2012. 4, 5
-
(2012)
Windows Internals, Part 1: Covering Windows Server 2008 R2 and Windows 7
-
-
RUSSINOVICH, M.1
SOLOMON, D.2
IONESCU, A.3
-
63
-
-
0029725135
-
The eyes have it: a task by data type taxonomy for information visualizations
-
14, 17
-
SHNEIDERMAN B.: The eyes have it: a task by data type taxonomy for information visualizations. In Proc. IEEE Symp. Visual Languages (1996), pp. 336-343. doi:10.1109/VL. 1996.545307. 14, 17
-
(1996)
Proc. IEEE Symp. Visual Languages
, pp. 336-343
-
-
SHNEIDERMAN, B.1
-
64
-
-
84922817764
-
Malware behavior image for malware variant identification
-
6, 7, 9, 11, 12, 13, 14, 15, 16
-
SHAID S., MAAROF M.: Malware behavior image for malware variant identification. In Proc. 2014 Int. Symp. on Biometrics and Security Technologies, ISBAST (2014), pp. 238-243. doi:10.1109/ISBAST.2014.7013128. 6, 7, 9, 11, 12, 13, 14, 15, 16
-
(2014)
Proc. 2014 Int. Symp. on Biometrics and Security Technologies, ISBAST
, pp. 238-243
-
-
SHAID, S.1
MAAROF, M.2
-
65
-
-
84907284118
-
Malware behaviour visualization
-
7, 9, 11, 12, 13, 14, 15, 16
-
SHAID, S.Z.M., MAAROF, M.A.: Malware behaviour visualization. Jurnal Teknologi 70, 5 (2014), 25-33. doi:10. 11113/jt.v70.3512. 6, 7, 9, 11, 12, 13, 14, 15, 16
-
(2014)
Jurnal Teknologi
, vol.70
, Issue.5
, pp. 25-33
-
-
SHAID, S.Z.M.1
MAAROF, M.A.2
-
66
-
-
84869049724
-
Visualization of shared system call sequence relationships in large malware corpora
-
ACM, 8, 11, 12, 13, 14, 15, 16, 17
-
SAXE J., MENTIS D., GREAMO C.: Visualization of shared system call sequence relationships in large malware corpora. In Proc. 9th Int. Symp. Visualization for Cyber Security, VizSec (2012), ACM, pp. 33-40. doi:10.1145/2379690. 2379695. 7, 8, 11, 12, 13, 14, 15, 16, 17
-
(2012)
Proc. 9th Int. Symp. Visualization for Cyber Security, VizSec
, pp. 33-40
-
-
SAXE, J.1
MENTIS, D.2
GREAMO, C.3
-
67
-
-
84867631961
-
Design study methodology: Reflections from the trenches and the stacks
-
SEDLMAIR M., MEYER M., MUNZNER T.: Design study methodology: Reflections from the trenches and the stacks. IEEE Transactions on Visualization and Computer Graphics 18, 12 (2012), 2431-2440. doi:10.1109/TVCG.2012.213. 17
-
(2012)
IEEE Transactions on Visualization and Computer Graphics
, vol.18
, Issue.12
, pp. 2431-2440
-
-
SEDLMAIR, M.1
MEYER, M.2
MUNZNER, T.3
-
68
-
-
84862606327
-
A survey of visualization systems for network security
-
SHIRAVI H., SHIRAVI A., GHORBANI A.: A survey of visualization systems for network security. IEEE Transactions on Visualization and Computer Graphics 18, 8 (2012), 1313-1329. doi:10.1109/TVCG.2011.144. 2
-
(2012)
IEEE Transactions on Visualization and Computer Graphics
, vol.18
, Issue.8
, pp. 1313-1329
-
-
SHIRAVI, H.1
SHIRAVI, A.2
GHORBANI, A.3
-
69
-
-
84909639487
-
Knowledge generation model for visual analytics
-
SACHA D., STOFFEL A., STOFFEL F., KWON B. C., ELLIS G., KEIM D.: Knowledge generation model for visual analytics. IEEE Transactions on Visualization and Computer Graphics 20, 12 (2014), 1604-1613. doi:10.1109/TVCG. 2014.2346481. 17
-
(2014)
IEEE Transactions on Visualization and Computer Graphics
, vol.20
, Issue.12
, pp. 1604-1613
-
-
SACHA, D.1
STOFFEL, A.2
STOFFEL, F.3
KWON, B. C.4
ELLIS, G.5
KEIM, D.6
-
70
-
-
73049094155
-
A survey of data mining techniques for malware detection using file features
-
ACM-SE 46
-
SIDDIQUI M., WANG M. C., LEE J.: A survey of data mining techniques for malware detection using file features. In Proc. 46th Ann. Southeast Regional Conference on XX (2008), ACM-SE 46, pp. 509-510. doi:10.1145/1593105.1593239. 2
-
(2008)
Proc. 46th Ann. Southeast Regional Conference on XX
, pp. 509-510
-
-
SIDDIQUI, M.1
WANG, M. C.2
LEE, J.3
-
71
-
-
34948892521
-
Illuminating the Path: The Research and Development Agenda for Visual Analytics
-
(Eds): 1, 2, 14, 17
-
THOMAS J. J., COOK K. A. (Eds.): Illuminating the Path: The Research and Development Agenda for Visual Analytics. IEEE, 2005. 1, 2, 14, 17
-
(2005)
IEEE
-
-
THOMAS, J. J.1
COOK, K. A.2
-
72
-
-
77949354717
-
Visual analysis of malware behavior using treemaps and thread graphs
-
7, 8, 11, 12, 13, 14, 15, 16
-
TRINIUS P., HOLZ T., GOBEL J., FREILING F.: Visual analysis of malware behavior using treemaps and thread graphs. In Proc. 6th Int. Workshop on Visualization for Cyber Security, VizSec (2009), pp. 33-38. doi:10.1109/VIZSEC. 2009.5375540. 7, 8, 11, 12, 13, 14, 15, 16
-
(2009)
Proc. 6th Int. Workshop on Visualization for Cyber Security, VizSec
, pp. 33-38
-
-
TRINIUS, P.1
HOLZ, T.2
GOBEL, J.3
FREILING, F.4
-
73
-
-
84946024598
-
-
VMWARE INC.:. [online]. [cited 2014-12-29]. 3
-
VMWARE INC.:. Vmware workstation [online]. 2014. URL: http://www.vmware.com/products/workstation/features.html [cited 2014-12-29]. 3
-
(2014)
Vmware workstation
-
-
-
74
-
-
84982811864
-
Problem characterization and abstraction for visual analytics in behavior-based malware pattern analysis
-
ACM
-
WAGNER M., AIGNER W., RIND A., DORNHACKL H., KADLETZ K., LUH R., TAVOLATO P.: Problem characterization and abstraction for visual analytics in behavior-based malware pattern analysis. In Proc. 11th Workshop on Visualization for Cyber Security, VizSec (2014), ACM, pp. 9-16. doi:10.1145/2671491.2671498. 1, 17
-
(2014)
Proc. 11th Workshop on Visualization for Cyber Security, VizSec
, pp. 9-16
-
-
WAGNER, M.1
AIGNER, W.2
RIND, A.3
DORNHACKL, H.4
KADLETZ, K.5
LUH, R.6
TAVOLATO, P.7
-
75
-
-
0031144006
-
Why interaction is more powerful than algorithms
-
WEGNER P.: Why interaction is more powerful than algorithms. Communications of the ACM 40, 5 (1997), 80-91. doi:10.1145/253769.253801. 2
-
(1997)
Communications of the ACM
, vol.40
, Issue.5
, pp. 80-91
-
-
WEGNER, P.1
-
76
-
-
34047110218
-
Toward automated dynamic malware analysis using CWSandbox
-
WILLEMS C., HOLZ T., FREILING F.: Toward automated dynamic malware analysis using CWSandbox. IEEE Security and Privacy 5, 2 (2007), 32-39. doi:10.1109/MSP. 2007.45. 5
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.2
, pp. 32-39
-
-
WILLEMS, C.1
HOLZ, T.2
FREILING, F.3
-
77
-
-
84982859261
-
Davast: Data-centric system level activity visualization
-
ACM, 7, 8, 11, 12, 13, 14, 15, 16
-
WÜCHNER T., PRETSCHNER A., OCHOA M.: Davast: Data-centric system level activity visualization. In Proc. 11th Workshop on Visualization for Cyber Security, VizSec (2014), ACM, pp. 25-32. doi:10.1145/2671491.2671499. 7, 8, 11, 12, 13, 14, 15, 16
-
(2014)
Proc. 11th Workshop on Visualization for Cyber Security, VizSec
, pp. 25-32
-
-
WÜCHNER, T.1
PRETSCHNER, A.2
OCHOA, M.3
-
78
-
-
84875646496
-
Experiments with malware visualization
-
Flegel U., Markatos E., Robertson W., (Eds), LNCS 7591, Springer, 9, 11, 12, 13, 14, 15, 16
-
WU Y., YAP R. H. C.: Experiments with malware visualization. In Proc. 9th Int. Conf. Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA (2013), Flegel U., Markatos E., Robertson W., (Eds.), LNCS 7591, Springer, pp. 123-133. doi:10.1007/978-3-642-37300-8_7. 7, 9, 11, 12, 13, 14, 15, 16
-
(2013)
Proc. 9th Int. Conf. Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA
, pp. 123-133
-
-
WU, Y.1
YAP, R. H. C.2
-
79
-
-
84872570869
-
A static and dynamic visual debugger for malware analysis
-
7, 8, 11, 12, 13, 14, 15, 16
-
YEE C. L., CHUAN L. L., ISMAIL M., ZAINAL N.: A static and dynamic visual debugger for malware analysis. In Proc. 18th Asia-Pacific Conf. Communications, APCC (2012), pp. 765-769. doi:10.1109/APCC.2012.6388211. 7, 8, 11, 12, 13, 14, 15, 16
-
(2012)
Proc. 18th Asia-Pacific Conf. Communications, APCC
, pp. 765-769
-
-
YEE, C. L.1
CHUAN, L. L.2
ISMAIL, M.3
ZAINAL, N.4
-
80
-
-
20444452578
-
Visualizing windows executable viruses using self-organizing maps
-
(New York, NY, USA), ACM, 10, 11, 12, 13, 14, 15, 16
-
YOO I.: Visualizing windows executable viruses using self-organizing maps. In Proc. ACM Workshop on Visualization and Data Mining for Computer Security, VizSec (New York, NY, USA, 2004), ACM, pp. 82-89. doi:10.1145/1029208. 1029222. 7, 10, 11, 12, 13, 14, 15, 16
-
(2004)
Proc. ACM Workshop on Visualization and Data Mining for Computer Security, VizSec
, pp. 82-89
-
-
YOO, I.1
-
81
-
-
84869061486
-
MalwareVis: Entity-based visualization of malware network traces
-
ACM, 7, 8, 11, 12, 13, 14, 15, 16
-
ZHUO W., NADJIN Y.: MalwareVis: Entity-based visualization of malware network traces. In Proc. 9th Int. Symp. Visualization for Cyber Security, VizSec (2012), ACM, pp. 41-47. doi:10.1145/2379690.2379696. 7, 8, 11, 12, 13, 14, 15, 16
-
(2012)
Proc. 9th Int. Symp. Visualization for Cyber Security, VizSec
, pp. 41-47
-
-
ZHUO, W.1
NADJIN, Y.2
|