Integrating Explicit Knowledge in the Visual Analytics Process - Knowledge-assisted Visual Analytics Methods for Time-oriented Data
暂无分享,去创建一个
[1] Srinivas Mukkamala,et al. Mobile malware visual analytics and similarities of Attack Toolkits (Malware gene analysis) , 2013, 2013 International Conference on Collaboration Technologies and Systems (CTS).
[2] M. Sedlmair. Requirements for a MDE System to Support Collaborative In-Car Communication Diagnostics , 2008 .
[3] S. Simon. Gait Analysis, Normal and Pathological Function. , 1993 .
[4] Terran Lane,et al. Improving malware classification: bridging the static/dynamic gap , 2012, AISec.
[5] Tamara Munzner,et al. MizBee: A Multiscale Synteny Browser , 2009, IEEE Transactions on Visualization and Computer Graphics.
[6] Hermann Schwameder,et al. Computer aided analysis of gait patterns in patients with acute anterior cruciate ligament injury. , 2016, Clinical biomechanics.
[7] Stephan Diehl,et al. Software Visualization - Visualizing the Structure, Behaviour, and Evolution of Software , 2007 .
[8] Thomas Brandt,et al. Automated classification of neurological disorders of gait using spatio-temporal gait parameters. , 2015, Journal of electromyography and kinesiology : official journal of the International Society of Electrophysiological Kinesiology.
[9] Robert Spence,et al. Information Visualization: Design for Interaction (2nd Edition) , 2006 .
[10] Matthew O. Ward,et al. Exploring N-dimensional databases , 1990, Proceedings of the First IEEE Conference on Visualization: Visualization `90.
[11] Ben Shneiderman,et al. Aligning temporal data by sentinel events: discovering patterns in electronic health records , 2008, CHI.
[12] Steven Franconeri,et al. The Connected Scatterplot for Presenting Paired Time Series , 2016, IEEE Transactions on Visualization and Computer Graphics.
[13] Ben Shneiderman,et al. Visual information seeking: tight coupling of dynamic query filters with starfield displays , 1994, CHI '94.
[14] Jeffrey Heer,et al. Scented Widgets: Improving Navigation Cues with Embedded Visualizations , 2007, IEEE Transactions on Visualization and Computer Graphics.
[15] Sheryl Staub-French,et al. Qualitative analysis of visualization: a building design field study , 2008, BELIV.
[16] Tamara Munzner,et al. Visualization Analysis and Design , 2014, A.K. Peters visualization series.
[17] Gavriel Salvendy,et al. The cognitive task analysis methods for job and task design: review and reappraisal , 2004, Behav. Inf. Technol..
[18] Min Chen,et al. Knowledge-Assisted Visualization , 2010 .
[19] Martin Wattenberg,et al. Arc diagrams: visualizing structure in strings , 2002, IEEE Symposium on Information Visualization, 2002. INFOVIS 2002..
[20] KyoungSoo Han,et al. Malware Analysis Using Visualized Image Matrices , 2014, TheScientificWorldJournal.
[21] Daniel A. Keim,et al. Visual Analytics: Scope and Challenges , 2008, Visual Data Mining.
[22] InSeon Yoo,et al. Visualizing windows executable viruses using self-organizing maps , 2004, VizSEC/DMSEC '04.
[23] Christopher Andrews,et al. The human is the loop: new directions for visual analytics , 2014, Journal of Intelligent Information Systems.
[24] Diane Staheli,et al. BubbleNet: A Cyber Security Dashboard for Visualizing Patterns , 2016, Comput. Graph. Forum.
[25] Ali Hamzeh,et al. A survey on heuristic malware detection techniques , 2013, The 5th Conference on Information and Knowledge Technology.
[26] Yacin Nadji,et al. MalwareVis: entity-based visualization of malware network traces , 2012, VizSec '12.
[27] Paolo Federico,et al. Visual Analytics of Electronic Health Records with a Focus on Time , 2017 .
[28] Ramana Rao,et al. Laying out and visualizing large trees using a hyperbolic space , 1994, UIST '94.
[29] Robin Sibson,et al. What is projection pursuit , 1987 .
[30] A. Adithya. Parallel Coordinates , 2015 .
[31] Nigel Shadbolt,et al. Resource Description Framework (RDF) , 2009 .
[32] Kerstin Blumenstein,et al. Native Cross-Platform Visualization: A Proof of Concept Based on the Unity3D Game Engine , 2016, 2016 20th International Conference Information Visualisation (IV).
[33] Silvia Miksch,et al. User tasks for evaluation: untangling the terminology throughout visualization design and development , 2014, BELIV.
[34] Kerstin Blumenstein,et al. Performance Comparison between Unity and D3.js for Cross-Platform Visualization on Mobile Devices , 2016, FMT.
[35] Edward Rolf Tufte,et al. The visual display of quantitative information , 1985 .
[36] Michel Beaudouin-Lafon,et al. Designing interaction, not interfaces , 2004, AVI.
[37] Peter Wegner,et al. Why interaction is more powerful than algorithms , 1997, CACM.
[38] Daniel A. Keim,et al. Feature-driven visual analytics of soccer data , 2014, 2014 IEEE Conference on Visual Analytics Science and Technology (VAST).
[39] Christopher Williamson,et al. Dynamic queries for information exploration: an implementation and evaluation , 1992, CHI.
[40] Michael Gertz,et al. A Model and Framework for Visualization Exploration , 2007, IEEE Transactions on Visualization and Computer Graphics.
[41] Ed Huai-hsin Chi. Expressiveness of the data flow and data state models in visualization systems , 2002, AVI '02.
[42] A. Cappozzo,et al. Human movement analysis using stereophotogrammetry. Part 1: theoretical background. , 2005, Gait & posture.
[43] Jeffrey Heer,et al. Sizing the horizon: the effects of chart size and layering on the graphical perception of time series visualizations , 2009, CHI.
[44] Chris North,et al. Visualizing cyber security: Usable workspaces , 2009, 2009 6th International Workshop on Visualization for Cyber Security.
[45] Yingcai Wu,et al. PieceStack: Toward Better Understanding of Stacked Graphs , 2016, IEEE Transactions on Visualization and Computer Graphics.
[46] Daniel A. Keim,et al. Visual Analytics of Movement , 2013, Springer Berlin Heidelberg.
[47] Markus Wagner,et al. Sequitur-based Inference and Analysis Framework for Malicious System Behavior , 2017, ICISSP.
[48] Jakob Nielsen,et al. Usability engineering , 1997, The Computer Science and Engineering Handbook.
[49] Silvia Miksch,et al. Towards a Concept how the Structure of Time can Support the Visual Analytics Process , 2011, EuroVA@EuroVis.
[50] Jock D. Mackinlay,et al. The structure of the information visualization design space , 1997, Proceedings of VIZ '97: Visualization Conference, Information Visualization Symposium and Parallel Rendering Symposium.
[51] Harry Hochheiser,et al. Research Methods for Human-Computer Interaction , 2008 .
[52] Markus Chimani,et al. The Open Graph Drawing Framework , 2013 .
[53] Tobias Schreck,et al. MotionExplorer: Exploratory Search in Human Motion Capture Data Based on Hierarchical Aggregation , 2013, IEEE Transactions on Visualization and Computer Graphics.
[54] Tamara Munzner,et al. Design Study Methodology: Reflections from the Trenches and the Stacks , 2012, IEEE Transactions on Visualization and Computer Graphics.
[55] Padhraic Smyth,et al. From Data Mining to Knowledge Discovery in Databases , 1996, AI Mag..
[56] Jarke J. van Wijk,et al. What Does the User Want to See? What do the Data Want to Be? , 2009, Inf. Vis..
[57] Heidrun Schumann,et al. Visualization of Time-Oriented Data , 2011, Human-Computer Interaction Series.
[58] Petra Perner. Intelligent data analysis in medicine - Recent advances , 2006, Artif. Intell. Medicine.
[59] Tamara Munzner,et al. A Nested Model for Visualization Design and Validation , 2009, IEEE Transactions on Visualization and Computer Graphics.
[60] Silvia Miksch,et al. Task Cube: A three-dimensional conceptual space of user tasks in visualization design and evaluation , 2016, Inf. Vis..
[61] Martin Wattenberg,et al. Parallel Tag Clouds to explore and analyze faceted text corpora , 2009, 2009 IEEE Symposium on Visual Analytics Science and Technology.
[62] Wolfgang Aigner,et al. EvalBench: A Software Library for Visualization Evaluation , 2013, Comput. Graph. Forum.
[63] Lucy T. Nowell,et al. ThemeRiver: Visualizing Thematic Changes in Large Document Collections , 2002, IEEE Trans. Vis. Comput. Graph..
[64] Steve Hanna,et al. A survey of mobile malware in the wild , 2011, SPSM '11.
[65] Torsten Bumgarner,et al. Biomechanics and Motor Control of Human Movement , 2013 .
[66] Silvia Miksch,et al. A Nested Workflow Model for Visual Analytics Design and Validation , 2016, BELIV '16.
[67] Eul Gyu Im,et al. Malware analysis method using visualization of binary files , 2013, RACS.
[68] Jugal K. Kalita,et al. Surveying Port Scans and Their Detection Methodologies , 2011, Comput. J..
[69] A. Rind,et al. Literature Review in Visual Analytics for Malware Pattern Analysis , 2015 .
[70] Yuval Shahar,et al. A Framework for Knowledge-Based Temporal Abstraction , 1997, Artif. Intell..
[71] Ken Perlin,et al. Pad: an alternative approach to the computer interface , 1993, SIGGRAPH.
[72] B. S. Manjunath,et al. Malware images: visualization and automatic classification , 2011, VizSec '11.
[73] William Ribarsky,et al. The Human-Computer System: Towards an Operational Model for Problem Solving , 2016, 2016 49th Hawaii International Conference on System Sciences (HICSS).
[74] Daniel A. Keim,et al. Mastering the Information Age - Solving Problems with Visual Analytics , 2010 .
[75] William Ribarsky,et al. Defining and applying knowledge conversion processes to a visual analytics system , 2009, Comput. Graph..
[76] Andreas Butz,et al. RelEx: Visualization for Actively Changing Overlay Network Specifications , 2012, IEEE Transactions on Visualization and Computer Graphics.
[77] Herman Chernoff,et al. The Use of Faces to Represent Points in k- Dimensional Space Graphically , 1973 .
[78] Wayne G. Lutters,et al. The Work of Intrusion Detection: Rethinking the Role of Security Analysts , 2004, AMCIS.
[79] W. Cleveland,et al. Graphical Perception: Theory, Experimentation, and Application to the Development of Graphical Methods , 1984 .
[80] Fei Wang,et al. ICDA: A Platform for Intelligent Care Delivery Analytics , 2012, AMIA.
[81] Hemant S. Patel. A process monitor , 1986 .
[82] Heidi Lam,et al. A Framework of Interaction Costs in Information Visualization , 2008, IEEE Transactions on Visualization and Computer Graphics.
[83] Michael Gertz,et al. A model for the visualization exploration process , 2002, IEEE Visualization, 2002. VIS 2002..
[84] Joshua Saxe,et al. Visualization of shared system call sequence relationships in large malware corpora , 2012, VizSec '12.
[85] Ben Shneiderman,et al. Tree visualization with tree-maps: 2-d space-filling approach , 1992, TOGS.
[86] Jolanta Pauk,et al. Gait patterns classification based on cluster and bicluster analysis , 2016 .
[87] Jürgen Bernard,et al. FuryExplorer: visual-interactive exploration of horse motion capture data , 2015, Electronic Imaging.
[88] Daniel A. Keim,et al. Visual analytics: how much visualization and how much analytics? , 2010, SKDD.
[89] Alan Cooper,et al. About Face 3: the essentials of interaction design , 1995 .
[90] Ivan Herman,et al. Graph Visualization and Navigation in Information Visualization: A Survey , 2000, IEEE Trans. Vis. Comput. Graph..
[91] Carole A. Tucker,et al. Measuring Walking: A Handbook of Clinical Gait Analysis , 2014 .
[92] Kerstin Blumenstein,et al. Evaluating Information Visualization on Mobile Devices: Gaps and Challenges in the Empirical Evaluation Design Space , 2016, BELIV '16.
[93] Mohd Aizaini Maarof,et al. Malware Behaviour Visualization , 2014 .
[94] John J. Bertin,et al. The semiology of graphics , 1983 .
[95] Roberto Tamassia,et al. Visualization of automated trust negotiation , 2005, IEEE Workshop on Visualization for Computer Security, 2005. (VizSEC 05)..
[96] Vitor Monte Afonso,et al. Interactive, Visual-Aided Tools to Analyze Malware Behavior , 2012, ICCSA.
[97] Thomas Panas. Signature visualization of software binaries , 2008, SoftVis '08.
[98] Matthew O. Ward,et al. Multivariate Network Visualization , 2014, Lecture Notes in Computer Science.
[99] Joohan Lee,et al. A survey of data mining techniques for malware detection using file features , 2008, ACM-SE 46.
[100] Vinzenz von Tscharner,et al. Gait patterns of asymmetric ankle osteoarthritis patients. , 2012, Clinical biomechanics.
[101] Wolfgang Aigner,et al. Problem characterization and abstraction for visual analytics in behavior-based malware pattern analysis , 2014, VizSEC.
[102] Mark Bailey,et al. The Grammar of Graphics , 2007, Technometrics.
[103] Jaime Urquiza-Fuentes,et al. Human-Centered Aspects , 2006, Human-Centered Visualization Environments.
[104] Marc Streit,et al. Opening the Black Box: Strategies for Increased User Involvement in Existing Algorithm Implementations , 2014, IEEE Transactions on Visualization and Computer Graphics.
[105] Dimitris Gritzalis,et al. Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software , 2012, Comput. Secur..
[106] Mahamod Ismail,et al. A static and dynamic visual debugger for malware analysis , 2012, 2012 18th Asia-Pacific Conference on Communications (APCC).
[107] Arnaud Sallaberry,et al. Visual analysis of body movement in serious games for healthcare , 2016, 2016 IEEE Pacific Visualization Symposium (PacificVis).
[108] Silvia Miksch,et al. Qualizon graphs: space-efficient time-series visualization with qualitative abstractions , 2014, AVI.
[109] R. Fisher. THE USE OF MULTIPLE MEASUREMENTS IN TAXONOMIC PROBLEMS , 1936 .
[110] Wenke Lee,et al. Grappa: A GRAPh PAckage in Java , 1997, GD.
[111] Richard A. Becker,et al. Brushing scatterplots , 1987 .
[112] 上官晓丽,et al. SP 800-30《风险评估实施指南》研究 , 2011 .
[113] Austin Henderson,et al. Interaction design: beyond human-computer interaction , 2002, UBIQ.
[114] Daniel A. Keim,et al. Designing Pixel-Oriented Visualization Techniques: Theory and Applications , 2000, IEEE Trans. Vis. Comput. Graph..
[115] Silvia Miksch,et al. Visual Exploration of Time-Oriented Patient Data for Chronic Diseases: Design Study and Evaluation , 2011, USAB.
[116] Srinivas Mukkamala,et al. Image visualization based malware detection , 2013, 2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).
[117] Min Chen,et al. From Web Data to Visualization via Ontology Mapping , 2008, Comput. Graph. Forum.
[118] Krist Wongsuphasawat,et al. Outflow : Visualizing Patient Flow by Symptoms and Outcome , 2011 .
[119] Diane Staheli,et al. Unlocking user-centered design methods for building cyber security visualizations , 2015, 2015 IEEE Symposium on Visualization for Cyber Security (VizSec).
[120] Frédéric Jouault,et al. Transforming Models with ATL , 2005, MoDELS.
[121] Reinhard Klein,et al. Efficient unsupervised temporal segmentation of human motion , 2014, SCA '14.
[122] Christopher Krügel,et al. A survey on automated dynamic malware-analysis techniques and tools , 2012, CSUR.
[123] Yuval Shahar,et al. An intelligent, interactive tool for exploration and visualization of time-oriented security data , 2006, VizSEC '06.
[124] Alexander Pretschner,et al. DAVAST: data-centric system level activity visualization , 2014, VizSec '14.
[125] Morgan Sangeux,et al. Sagittal gait patterns in cerebral palsy: the plantarflexor-knee extension couple index. , 2015, Gait & posture.
[126] Felix C. Freiling,et al. Visual analysis of malware behavior using treemaps and thread graphs , 2009, 2009 6th International Workshop on Visualization for Cyber Security.
[127] Klaus Mueller,et al. A high-dimensional feature clustering approach to support knowledge-assisted visualization , 2009, Comput. Graph..
[128] Richard Baker,et al. GaitaBase: Web-based repository system for gait analysis , 2010, Comput. Biol. Medicine.
[129] M. S. T. Carpendale,et al. Considering Visual Variables as a Basis for Information Visualisation , 2003 .
[130] Christian Tominski,et al. Event-Based Concepts for User-Driven Visualization , 2011, Inf. Vis..
[131] Matthew O. Ward,et al. Theoretical Foundations of Information Visualization , 2008, Information Visualization.
[132] John T. Stasko,et al. The Science of Interaction , 2009, Inf. Vis..
[133] Robert Luh,et al. Malicious Behavior Patterns , 2014, 2014 IEEE 8th International Symposium on Service Oriented System Engineering.
[134] Blaz Zupan,et al. Knowledge-based data analysis and interpretation , 2006, Artif. Intell. Medicine.
[135] Ian H. Witten,et al. Identifying Hierarchical Structure in Sequences: A linear-time algorithm , 1997, J. Artif. Intell. Res..
[136] Martin Wattenberg,et al. The Word Tree, an Interactive Visual Concordance , 2008, IEEE Transactions on Visualization and Computer Graphics.
[137] Niklas Elmqvist,et al. Graphical Perception of Multiple Time Series , 2010, IEEE Transactions on Visualization and Computer Graphics.
[138] Ali A. Ghorbani,et al. A Survey of Visualization Systems for Network Security , 2012, IEEE Transactions on Visualization and Computer Graphics.
[139] Daniel A. Keim,et al. Knowledge Generation Model for Visual Analytics , 2014, IEEE Transactions on Visualization and Computer Graphics.
[140] John T. Stasko,et al. Knowledge precepts for design and evaluation of information visualizations , 2005, IEEE Transactions on Visualization and Computer Graphics.
[141] Silvia Miksch,et al. Gnaeus: Utilizing Clinical Guidelines for Knowledge-assisted Visualisation of EHR Cohorts , 2015, EuroVA@EuroVis.
[142] Lorie M. Liebrock,et al. Reversing Compiled Executables for Malware Analysis via Visualization , 2011, Inf. Vis..
[143] Robert Spence,et al. Externalising abstract mathematical models , 1996, CHI '96.
[144] P. S. Sastry,et al. A survey of temporal data mining , 2006 .
[145] Markus Wagner,et al. Visual Analytics : Foundations and Experiences in Malware Analysis , 2018 .
[146] Karl M Newell,et al. Diagnosing fatigue in gait patterns by support vector machines and self-organizing maps. , 2011, Human movement science.
[147] Vinod Yegneswaran,et al. A comparative assessment of malware classification using binary texture analysis and dynamic analysis , 2011, AISec '11.
[148] Tamara Munzner,et al. A Multi-Level Typology of Abstract Visualization Tasks , 2013, IEEE Transactions on Visualization and Computer Graphics.
[149] Kristin A. Cook,et al. Illuminating the Path: The Research and Development Agenda for Visual Analytics , 2005 .
[150] Richard May,et al. Foundations and Frontiers in Visual Analytics , 2009, Inf. Vis..
[151] Somesh Jha,et al. Mining specifications of malicious behavior , 2008, ISEC '08.
[152] Rafael D. C. Santos,et al. Visualization techniques for malware behavior analysis , 2011, Defense + Commercial Sensing.
[153] Jarke J. van Wijk,et al. The value of visualization , 2005, VIS 05. IEEE Visualization, 2005..
[154] Kevin J Deluzio,et al. A Global Gait Asymmetry Index. , 2016, Journal of applied biomechanics.
[155] Denis Lalanne,et al. Surveying the complementary role of automatic data analysis and visualization in knowledge discovery , 2009, VAKD '09.
[156] Kurt M. Bischoff. Design, Implementation, Use, and Evaluation of Ox: An Attribute- Grammar Compiling System based on Yacc, Lex, and C , 1992 .
[157] Markus Wagner,et al. Knowledge-Assisted Rule Building for Malware Analysis , 2016 .
[158] Dimitrios Tzovaras,et al. Security for smart mobile networks: The NEMESYS approach , 2013, 2013 IEEE Global High Tech Congress on Electronics.
[159] John Riedl,et al. An operator interaction framework for visualization systems , 1998, Proceedings IEEE Symposium on Information Visualization (Cat. No.98TB100258).
[160] Tamara Munzner,et al. LiveRAC: interactive visual exploration of system management time-series data , 2008, CHI.
[161] Juha Lehikoinen,et al. Refining visualization reference model for context information , 2005, Personal and Ubiquitous Computing.
[162] Alex Endert,et al. Toward Theoretical Techniques for Measuring the Use of Human Effort in Visual Analytic Systems , 2017, IEEE Transactions on Visualization and Computer Graphics.
[163] Lorie M. Liebrock,et al. Visualizing compiled executables for malware analysis , 2009, 2009 6th International Workshop on Visualization for Cyber Security.
[164] Margaret-Anne D. Storey,et al. Creating Visualizations through Ontology Mapping , 2009, 2009 International Conference on Complex, Intelligent and Software Intensive Systems.
[165] Ben Shneiderman,et al. The eyes have it: a task by data type taxonomy for information visualizations , 1996, Proceedings 1996 IEEE Symposium on Visual Languages.
[166] Eul Gyu Im,et al. Malware analysis using visualized images and entropy graphs , 2014, International Journal of Information Security.
[167] Arjan Kuijper,et al. Visual Analysis of Large Graphs: State‐of‐the‐Art and Future Research Challenges , 2011, Eurographics.
[168] Pat Hanrahan,et al. Visualization of Heterogeneous Data , 2007, IEEE Transactions on Visualization and Computer Graphics.
[169] Jeffrey Heer,et al. prefuse: a toolkit for interactive information visualization , 2005, CHI.
[170] Tobias Schreck,et al. Visual Cluster Analysis of Trajectory Data with Interactive Kohonen Maps , 2008, 2008 IEEE Symposium on Visual Analytics Science and Technology.
[171] Greg,et al. Security data visualization : graphical techniques for network analysis , 2007 .
[172] D. F. Andrews,et al. PLOTS OF HIGH-DIMENSIONAL DATA , 1972 .
[173] Silvia Miksch,et al. Hierarchical Temporal Patterns and Interactive Aggregated Views for Pixel-Based Visualizations , 2009, 2009 13th International Conference Information Visualisation.
[174] Mourad Debbabi,et al. Cyber Scanning: A Comprehensive Survey , 2014, IEEE Communications Surveys & Tutorials.
[175] Emden R. Gansner,et al. Graphviz and Dynagraph – Static and Dynamic Graph Drawing Tools , 2003 .
[176] Christopher Kirtley,et al. Clinical Gait Analysis: Theory and Practice , 2006 .
[177] Gregory J. Conti,et al. Visual Reverse Engineering of Binary and Data Files , 2008, VizSEC.
[178] Hans-Peter Kriegel,et al. 'Circle Segments': A Technique for Visually Exploring Large Multidimensional Data Sets , 1996 .
[179] Jock D. Mackinlay,et al. Automating the design of graphical presentations of relational information , 1986, TOGS.
[180] Gennady L. Andrienko,et al. Exploratory analysis of spatial and temporal data - a systematic approach , 2005 .
[181] David J. Hand. Intelligent Data Analysis: Issues and Opportunities , 1998, Intell. Data Anal..
[182] Xiaohua Hu,et al. A Visualization Model of Interactive Knowledge Discovery Systems and Its Implementations , 2003, Inf. Vis..
[183] Henry L. Owen,et al. Visual Analysis of Program Flow Data with Data Propagation , 2008, VizSEC.
[184] Kerstin Blumenstein,et al. PubViz: Lightweight Visual Presentation of Publication Data , 2017, EuroVis.
[185] Kwan-Liu Ma,et al. Information and Knowledge assisted analysis and Visualization of large-scale data , 2008, 2008 Workshop on Ultrascale Visualization.
[186] Charles Perin,et al. SoccerStories: A Kick-off for Visual Soccer Analysis , 2013, IEEE Transactions on Visualization and Computer Graphics.
[187] Chaomei Chen,et al. Top 10 Unsolved Information Visualization Problems , 2005, IEEE Computer Graphics and Applications.
[188] Leland Wilkinson,et al. AutoVis: Automatic Visualization , 2010, Inf. Vis..
[189] Robert Gove,et al. Detecting malware samples with similar image sets , 2014, VizSEC.
[190] Tobias Schreck,et al. TimeSeriesPaths : Projection-Based Explorative Analysis of Multivariate Time Series Data , 2012, WSCG 2012.
[191] Wolfgang Aigner,et al. A knowledge-assisted visual malware analysis system: Design, validation, and reflection of KAMAS , 2016, Comput. Secur..
[192] Min Chen,et al. Data, Information, and Knowledge in Visualization , 2009, IEEE Computer Graphics and Applications.
[193] A. Leardini,et al. Data management in gait analysis for clinical applications. , 1998, Clinical biomechanics.
[194] Fernando Vieira Paulovich,et al. Nmap: A Novel Neighborhood Preservation Space-filling Algorithm , 2014, IEEE Transactions on Visualization and Computer Graphics.
[195] Daniel A. Keim,et al. A Survey of Visualization Systems for Malware Analysis , 2015, EuroVis.
[196] Stefan Bruckner,et al. Smart super views — A knowledge-assisted interface for medical visualization , 2012, 2012 IEEE Conference on Visual Analytics Science and Technology (VAST).
[197] Aditya P. Mathur,et al. A Survey of Malware Detection Techniques , 2007 .
[198] Srinivas Mukkamala,et al. Visualization techniques for efficient malware detection , 2013, 2013 IEEE International Conference on Intelligence and Security Informatics.
[199] Georges G. Grinstein,et al. Iconographic Displays For Visualizing Multidimensional Data , 1988, Proceedings of the 1988 IEEE International Conference on Systems, Man, and Cybernetics.
[200] Yuval Shahar,et al. Temporal Information Systems in Medicine , 2010 .
[201] Benjamin J. Kadlec,et al. Knowledge-Assisted Visualization and Segmentation of Geologic Features , 2010, IEEE Computer Graphics and Applications.
[202] Nooritawati Md Tahir,et al. Parkinson Disease gait classification based on machine learning approach , 2012 .
[203] Florian Windhager,et al. Should we Dream the Impossible Dream of Reproducibility in Visual Analytics Evaluation? , 2015, EuroRV³@EuroVis.
[204] Felix C. Freiling,et al. Toward Automated Dynamic Malware Analysis Using CWSandbox , 2007, IEEE Secur. Priv..
[205] Robert Gove,et al. SEEM: a scalable visualization for comparing multiple large sets of attributes for malware analysis , 2014, VizSEC.
[206] Jeffrey Johnson,et al. Designing with the mind in mind : simple guide to understanding user interface design guidelines , 2014 .
[207] Roland H. C. Yap,et al. Experiments with Malware Visualization , 2012, DIMVA.
[208] Mohd Aizaini Maarof,et al. Malware behavior image for malware variant identification , 2014, 2014 International Symposium on Biometrics and Security Technologies (ISBAST).
[209] Min Chen,et al. What May Visualization Processes Optimize? , 2015, IEEE Transactions on Visualization and Computer Graphics.
[210] Kuinam J. Kim,et al. A Study on Malicious Codes Pattern Analysis Using Visualization , 2011, 2011 International Conference on Information Science and Applications.
[211] Pat Hanrahan,et al. Show Me: Automatic Presentation for Visual Analysis , 2007, IEEE Transactions on Visualization and Computer Graphics.
[212] Jeffrey Heer,et al. A tour through the visualization zoo , 2010, ACM Queue.
[213] U. Bayer,et al. TTAnalyze: A Tool for Analyzing Malware , 2006 .
[214] R. Major. Biomechanics of the Musculo-Skeletal System , 1994 .
[215] Daniel A. Keim,et al. Information Visualization and Visual Data Mining , 2002, IEEE Trans. Vis. Comput. Graph..
[216] Silvia Miksch,et al. A matter of time: Applying a data-users-tasks design triangle to visual analytics of time-oriented data , 2014, Comput. Graph..
[217] J. B. Brooke,et al. SUS: A 'Quick and Dirty' Usability Scale , 1996 .
[218] Daniel A. Keim,et al. Real-time visual analytics for event data streams , 2012, SAC '12.
[219] Hans-Peter Kriegel,et al. Recursive pattern: a technique for visualizing very large amounts of data , 1995, Proceedings Visualization '95.
[220] Silvia Miksch,et al. Exploring highly structured data: a comparative study of stardinates and parallel coordinates , 2005, Ninth International Conference on Information Visualisation (IV'05).
[221] Philip T. Kortum,et al. Determining what individual SUS scores mean: adding an adjective rating scale , 2009 .
[222] Arjan Kuijper,et al. A Reference Model for Adaptive Visualization Systems , 2011, HCI.
[223] Ed H. Chi,et al. A taxonomy of visualization techniques using the data state reference model , 2000, IEEE Symposium on Information Visualization 2000. INFOVIS 2000. Proceedings.
[224] Martin Pirker,et al. A Work-Flow for Empirical Exploration of Security Events , 2016, WWW.
[225] M. Sheelagh T. Carpendale,et al. Empirical Studies in Information Visualization: Seven Scenarios , 2012, IEEE Transactions on Visualization and Computer Graphics.