Integrating Explicit Knowledge in the Visual Analytics Process - Knowledge-assisted Visual Analytics Methods for Time-oriented Data

In this paper, I describe my thesis project for the integration of explicit knowledge from domain experts into the visual analytics process. As base for the implementation of the research project, I will follow the nested model for visualization design and validation. Additionally, I use a problem-driven approach to study knowledge-assisted visualization systems for time-oriented data in the context of real world problems. At first, my research will focus on the ITsecurity domain where I analyze the needs of malware analysts to support them during their work. Therefore I have currently prepared a problem characterization and abstraction to understand the needs of the domain experts to gain more insight into their workflow. Based on that findings, I am currently working on the design and the implementation of a prototype. Next, I will evaluate these visual analytics methods and finally I will test the generalizability of the knowledgeassisted visual analytics methods in a second domain.

[1]  Srinivas Mukkamala,et al.  Mobile malware visual analytics and similarities of Attack Toolkits (Malware gene analysis) , 2013, 2013 International Conference on Collaboration Technologies and Systems (CTS).

[2]  M. Sedlmair Requirements for a MDE System to Support Collaborative In-Car Communication Diagnostics , 2008 .

[3]  S. Simon Gait Analysis, Normal and Pathological Function. , 1993 .

[4]  Terran Lane,et al.  Improving malware classification: bridging the static/dynamic gap , 2012, AISec.

[5]  Tamara Munzner,et al.  MizBee: A Multiscale Synteny Browser , 2009, IEEE Transactions on Visualization and Computer Graphics.

[6]  Hermann Schwameder,et al.  Computer aided analysis of gait patterns in patients with acute anterior cruciate ligament injury. , 2016, Clinical biomechanics.

[7]  Stephan Diehl,et al.  Software Visualization - Visualizing the Structure, Behaviour, and Evolution of Software , 2007 .

[8]  Thomas Brandt,et al.  Automated classification of neurological disorders of gait using spatio-temporal gait parameters. , 2015, Journal of electromyography and kinesiology : official journal of the International Society of Electrophysiological Kinesiology.

[9]  Robert Spence,et al.  Information Visualization: Design for Interaction (2nd Edition) , 2006 .

[10]  Matthew O. Ward,et al.  Exploring N-dimensional databases , 1990, Proceedings of the First IEEE Conference on Visualization: Visualization `90.

[11]  Ben Shneiderman,et al.  Aligning temporal data by sentinel events: discovering patterns in electronic health records , 2008, CHI.

[12]  Steven Franconeri,et al.  The Connected Scatterplot for Presenting Paired Time Series , 2016, IEEE Transactions on Visualization and Computer Graphics.

[13]  Ben Shneiderman,et al.  Visual information seeking: tight coupling of dynamic query filters with starfield displays , 1994, CHI '94.

[14]  Jeffrey Heer,et al.  Scented Widgets: Improving Navigation Cues with Embedded Visualizations , 2007, IEEE Transactions on Visualization and Computer Graphics.

[15]  Sheryl Staub-French,et al.  Qualitative analysis of visualization: a building design field study , 2008, BELIV.

[16]  Tamara Munzner,et al.  Visualization Analysis and Design , 2014, A.K. Peters visualization series.

[17]  Gavriel Salvendy,et al.  The cognitive task analysis methods for job and task design: review and reappraisal , 2004, Behav. Inf. Technol..

[18]  Min Chen,et al.  Knowledge-Assisted Visualization , 2010 .

[19]  Martin Wattenberg,et al.  Arc diagrams: visualizing structure in strings , 2002, IEEE Symposium on Information Visualization, 2002. INFOVIS 2002..

[20]  KyoungSoo Han,et al.  Malware Analysis Using Visualized Image Matrices , 2014, TheScientificWorldJournal.

[21]  Daniel A. Keim,et al.  Visual Analytics: Scope and Challenges , 2008, Visual Data Mining.

[22]  InSeon Yoo,et al.  Visualizing windows executable viruses using self-organizing maps , 2004, VizSEC/DMSEC '04.

[23]  Christopher Andrews,et al.  The human is the loop: new directions for visual analytics , 2014, Journal of Intelligent Information Systems.

[24]  Diane Staheli,et al.  BubbleNet: A Cyber Security Dashboard for Visualizing Patterns , 2016, Comput. Graph. Forum.

[25]  Ali Hamzeh,et al.  A survey on heuristic malware detection techniques , 2013, The 5th Conference on Information and Knowledge Technology.

[26]  Yacin Nadji,et al.  MalwareVis: entity-based visualization of malware network traces , 2012, VizSec '12.

[27]  Paolo Federico,et al.  Visual Analytics of Electronic Health Records with a Focus on Time , 2017 .

[28]  Ramana Rao,et al.  Laying out and visualizing large trees using a hyperbolic space , 1994, UIST '94.

[29]  Robin Sibson,et al.  What is projection pursuit , 1987 .

[30]  A. Adithya Parallel Coordinates , 2015 .

[31]  Nigel Shadbolt,et al.  Resource Description Framework (RDF) , 2009 .

[32]  Kerstin Blumenstein,et al.  Native Cross-Platform Visualization: A Proof of Concept Based on the Unity3D Game Engine , 2016, 2016 20th International Conference Information Visualisation (IV).

[33]  Silvia Miksch,et al.  User tasks for evaluation: untangling the terminology throughout visualization design and development , 2014, BELIV.

[34]  Kerstin Blumenstein,et al.  Performance Comparison between Unity and D3.js for Cross-Platform Visualization on Mobile Devices , 2016, FMT.

[35]  Edward Rolf Tufte,et al.  The visual display of quantitative information , 1985 .

[36]  Michel Beaudouin-Lafon,et al.  Designing interaction, not interfaces , 2004, AVI.

[37]  Peter Wegner,et al.  Why interaction is more powerful than algorithms , 1997, CACM.

[38]  Daniel A. Keim,et al.  Feature-driven visual analytics of soccer data , 2014, 2014 IEEE Conference on Visual Analytics Science and Technology (VAST).

[39]  Christopher Williamson,et al.  Dynamic queries for information exploration: an implementation and evaluation , 1992, CHI.

[40]  Michael Gertz,et al.  A Model and Framework for Visualization Exploration , 2007, IEEE Transactions on Visualization and Computer Graphics.

[41]  Ed Huai-hsin Chi Expressiveness of the data flow and data state models in visualization systems , 2002, AVI '02.

[42]  A. Cappozzo,et al.  Human movement analysis using stereophotogrammetry. Part 1: theoretical background. , 2005, Gait & posture.

[43]  Jeffrey Heer,et al.  Sizing the horizon: the effects of chart size and layering on the graphical perception of time series visualizations , 2009, CHI.

[44]  Chris North,et al.  Visualizing cyber security: Usable workspaces , 2009, 2009 6th International Workshop on Visualization for Cyber Security.

[45]  Yingcai Wu,et al.  PieceStack: Toward Better Understanding of Stacked Graphs , 2016, IEEE Transactions on Visualization and Computer Graphics.

[46]  Daniel A. Keim,et al.  Visual Analytics of Movement , 2013, Springer Berlin Heidelberg.

[47]  Markus Wagner,et al.  Sequitur-based Inference and Analysis Framework for Malicious System Behavior , 2017, ICISSP.

[48]  Jakob Nielsen,et al.  Usability engineering , 1997, The Computer Science and Engineering Handbook.

[49]  Silvia Miksch,et al.  Towards a Concept how the Structure of Time can Support the Visual Analytics Process , 2011, EuroVA@EuroVis.

[50]  Jock D. Mackinlay,et al.  The structure of the information visualization design space , 1997, Proceedings of VIZ '97: Visualization Conference, Information Visualization Symposium and Parallel Rendering Symposium.

[51]  Harry Hochheiser,et al.  Research Methods for Human-Computer Interaction , 2008 .

[52]  Markus Chimani,et al.  The Open Graph Drawing Framework , 2013 .

[53]  Tobias Schreck,et al.  MotionExplorer: Exploratory Search in Human Motion Capture Data Based on Hierarchical Aggregation , 2013, IEEE Transactions on Visualization and Computer Graphics.

[54]  Tamara Munzner,et al.  Design Study Methodology: Reflections from the Trenches and the Stacks , 2012, IEEE Transactions on Visualization and Computer Graphics.

[55]  Padhraic Smyth,et al.  From Data Mining to Knowledge Discovery in Databases , 1996, AI Mag..

[56]  Jarke J. van Wijk,et al.  What Does the User Want to See? What do the Data Want to Be? , 2009, Inf. Vis..

[57]  Heidrun Schumann,et al.  Visualization of Time-Oriented Data , 2011, Human-Computer Interaction Series.

[58]  Petra Perner Intelligent data analysis in medicine - Recent advances , 2006, Artif. Intell. Medicine.

[59]  Tamara Munzner,et al.  A Nested Model for Visualization Design and Validation , 2009, IEEE Transactions on Visualization and Computer Graphics.

[60]  Silvia Miksch,et al.  Task Cube: A three-dimensional conceptual space of user tasks in visualization design and evaluation , 2016, Inf. Vis..

[61]  Martin Wattenberg,et al.  Parallel Tag Clouds to explore and analyze faceted text corpora , 2009, 2009 IEEE Symposium on Visual Analytics Science and Technology.

[62]  Wolfgang Aigner,et al.  EvalBench: A Software Library for Visualization Evaluation , 2013, Comput. Graph. Forum.

[63]  Lucy T. Nowell,et al.  ThemeRiver: Visualizing Thematic Changes in Large Document Collections , 2002, IEEE Trans. Vis. Comput. Graph..

[64]  Steve Hanna,et al.  A survey of mobile malware in the wild , 2011, SPSM '11.

[65]  Torsten Bumgarner,et al.  Biomechanics and Motor Control of Human Movement , 2013 .

[66]  Silvia Miksch,et al.  A Nested Workflow Model for Visual Analytics Design and Validation , 2016, BELIV '16.

[67]  Eul Gyu Im,et al.  Malware analysis method using visualization of binary files , 2013, RACS.

[68]  Jugal K. Kalita,et al.  Surveying Port Scans and Their Detection Methodologies , 2011, Comput. J..

[69]  A. Rind,et al.  Literature Review in Visual Analytics for Malware Pattern Analysis , 2015 .

[70]  Yuval Shahar,et al.  A Framework for Knowledge-Based Temporal Abstraction , 1997, Artif. Intell..

[71]  Ken Perlin,et al.  Pad: an alternative approach to the computer interface , 1993, SIGGRAPH.

[72]  B. S. Manjunath,et al.  Malware images: visualization and automatic classification , 2011, VizSec '11.

[73]  William Ribarsky,et al.  The Human-Computer System: Towards an Operational Model for Problem Solving , 2016, 2016 49th Hawaii International Conference on System Sciences (HICSS).

[74]  Daniel A. Keim,et al.  Mastering the Information Age - Solving Problems with Visual Analytics , 2010 .

[75]  William Ribarsky,et al.  Defining and applying knowledge conversion processes to a visual analytics system , 2009, Comput. Graph..

[76]  Andreas Butz,et al.  RelEx: Visualization for Actively Changing Overlay Network Specifications , 2012, IEEE Transactions on Visualization and Computer Graphics.

[77]  Herman Chernoff,et al.  The Use of Faces to Represent Points in k- Dimensional Space Graphically , 1973 .

[78]  Wayne G. Lutters,et al.  The Work of Intrusion Detection: Rethinking the Role of Security Analysts , 2004, AMCIS.

[79]  W. Cleveland,et al.  Graphical Perception: Theory, Experimentation, and Application to the Development of Graphical Methods , 1984 .

[80]  Fei Wang,et al.  ICDA: A Platform for Intelligent Care Delivery Analytics , 2012, AMIA.

[81]  Hemant S. Patel A process monitor , 1986 .

[82]  Heidi Lam,et al.  A Framework of Interaction Costs in Information Visualization , 2008, IEEE Transactions on Visualization and Computer Graphics.

[83]  Michael Gertz,et al.  A model for the visualization exploration process , 2002, IEEE Visualization, 2002. VIS 2002..

[84]  Joshua Saxe,et al.  Visualization of shared system call sequence relationships in large malware corpora , 2012, VizSec '12.

[85]  Ben Shneiderman,et al.  Tree visualization with tree-maps: 2-d space-filling approach , 1992, TOGS.

[86]  Jolanta Pauk,et al.  Gait patterns classification based on cluster and bicluster analysis , 2016 .

[87]  Jürgen Bernard,et al.  FuryExplorer: visual-interactive exploration of horse motion capture data , 2015, Electronic Imaging.

[88]  Daniel A. Keim,et al.  Visual analytics: how much visualization and how much analytics? , 2010, SKDD.

[89]  Alan Cooper,et al.  About Face 3: the essentials of interaction design , 1995 .

[90]  Ivan Herman,et al.  Graph Visualization and Navigation in Information Visualization: A Survey , 2000, IEEE Trans. Vis. Comput. Graph..

[91]  Carole A. Tucker,et al.  Measuring Walking: A Handbook of Clinical Gait Analysis , 2014 .

[92]  Kerstin Blumenstein,et al.  Evaluating Information Visualization on Mobile Devices: Gaps and Challenges in the Empirical Evaluation Design Space , 2016, BELIV '16.

[93]  Mohd Aizaini Maarof,et al.  Malware Behaviour Visualization , 2014 .

[94]  John J. Bertin,et al.  The semiology of graphics , 1983 .

[95]  Roberto Tamassia,et al.  Visualization of automated trust negotiation , 2005, IEEE Workshop on Visualization for Computer Security, 2005. (VizSEC 05)..

[96]  Vitor Monte Afonso,et al.  Interactive, Visual-Aided Tools to Analyze Malware Behavior , 2012, ICCSA.

[97]  Thomas Panas Signature visualization of software binaries , 2008, SoftVis '08.

[98]  Matthew O. Ward,et al.  Multivariate Network Visualization , 2014, Lecture Notes in Computer Science.

[99]  Joohan Lee,et al.  A survey of data mining techniques for malware detection using file features , 2008, ACM-SE 46.

[100]  Vinzenz von Tscharner,et al.  Gait patterns of asymmetric ankle osteoarthritis patients. , 2012, Clinical biomechanics.

[101]  Wolfgang Aigner,et al.  Problem characterization and abstraction for visual analytics in behavior-based malware pattern analysis , 2014, VizSEC.

[102]  Mark Bailey,et al.  The Grammar of Graphics , 2007, Technometrics.

[103]  Jaime Urquiza-Fuentes,et al.  Human-Centered Aspects , 2006, Human-Centered Visualization Environments.

[104]  Marc Streit,et al.  Opening the Black Box: Strategies for Increased User Involvement in Existing Algorithm Implementations , 2014, IEEE Transactions on Visualization and Computer Graphics.

[105]  Dimitris Gritzalis,et al.  Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software , 2012, Comput. Secur..

[106]  Mahamod Ismail,et al.  A static and dynamic visual debugger for malware analysis , 2012, 2012 18th Asia-Pacific Conference on Communications (APCC).

[107]  Arnaud Sallaberry,et al.  Visual analysis of body movement in serious games for healthcare , 2016, 2016 IEEE Pacific Visualization Symposium (PacificVis).

[108]  Silvia Miksch,et al.  Qualizon graphs: space-efficient time-series visualization with qualitative abstractions , 2014, AVI.

[109]  R. Fisher THE USE OF MULTIPLE MEASUREMENTS IN TAXONOMIC PROBLEMS , 1936 .

[110]  Wenke Lee,et al.  Grappa: A GRAPh PAckage in Java , 1997, GD.

[111]  Richard A. Becker,et al.  Brushing scatterplots , 1987 .

[112]  上官晓丽,et al.  SP 800-30《风险评估实施指南》研究 , 2011 .

[113]  Austin Henderson,et al.  Interaction design: beyond human-computer interaction , 2002, UBIQ.

[114]  Daniel A. Keim,et al.  Designing Pixel-Oriented Visualization Techniques: Theory and Applications , 2000, IEEE Trans. Vis. Comput. Graph..

[115]  Silvia Miksch,et al.  Visual Exploration of Time-Oriented Patient Data for Chronic Diseases: Design Study and Evaluation , 2011, USAB.

[116]  Srinivas Mukkamala,et al.  Image visualization based malware detection , 2013, 2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).

[117]  Min Chen,et al.  From Web Data to Visualization via Ontology Mapping , 2008, Comput. Graph. Forum.

[118]  Krist Wongsuphasawat,et al.  Outflow : Visualizing Patient Flow by Symptoms and Outcome , 2011 .

[119]  Diane Staheli,et al.  Unlocking user-centered design methods for building cyber security visualizations , 2015, 2015 IEEE Symposium on Visualization for Cyber Security (VizSec).

[120]  Frédéric Jouault,et al.  Transforming Models with ATL , 2005, MoDELS.

[121]  Reinhard Klein,et al.  Efficient unsupervised temporal segmentation of human motion , 2014, SCA '14.

[122]  Christopher Krügel,et al.  A survey on automated dynamic malware-analysis techniques and tools , 2012, CSUR.

[123]  Yuval Shahar,et al.  An intelligent, interactive tool for exploration and visualization of time-oriented security data , 2006, VizSEC '06.

[124]  Alexander Pretschner,et al.  DAVAST: data-centric system level activity visualization , 2014, VizSec '14.

[125]  Morgan Sangeux,et al.  Sagittal gait patterns in cerebral palsy: the plantarflexor-knee extension couple index. , 2015, Gait & posture.

[126]  Felix C. Freiling,et al.  Visual analysis of malware behavior using treemaps and thread graphs , 2009, 2009 6th International Workshop on Visualization for Cyber Security.

[127]  Klaus Mueller,et al.  A high-dimensional feature clustering approach to support knowledge-assisted visualization , 2009, Comput. Graph..

[128]  Richard Baker,et al.  GaitaBase: Web-based repository system for gait analysis , 2010, Comput. Biol. Medicine.

[129]  M. S. T. Carpendale,et al.  Considering Visual Variables as a Basis for Information Visualisation , 2003 .

[130]  Christian Tominski,et al.  Event-Based Concepts for User-Driven Visualization , 2011, Inf. Vis..

[131]  Matthew O. Ward,et al.  Theoretical Foundations of Information Visualization , 2008, Information Visualization.

[132]  John T. Stasko,et al.  The Science of Interaction , 2009, Inf. Vis..

[133]  Robert Luh,et al.  Malicious Behavior Patterns , 2014, 2014 IEEE 8th International Symposium on Service Oriented System Engineering.

[134]  Blaz Zupan,et al.  Knowledge-based data analysis and interpretation , 2006, Artif. Intell. Medicine.

[135]  Ian H. Witten,et al.  Identifying Hierarchical Structure in Sequences: A linear-time algorithm , 1997, J. Artif. Intell. Res..

[136]  Martin Wattenberg,et al.  The Word Tree, an Interactive Visual Concordance , 2008, IEEE Transactions on Visualization and Computer Graphics.

[137]  Niklas Elmqvist,et al.  Graphical Perception of Multiple Time Series , 2010, IEEE Transactions on Visualization and Computer Graphics.

[138]  Ali A. Ghorbani,et al.  A Survey of Visualization Systems for Network Security , 2012, IEEE Transactions on Visualization and Computer Graphics.

[139]  Daniel A. Keim,et al.  Knowledge Generation Model for Visual Analytics , 2014, IEEE Transactions on Visualization and Computer Graphics.

[140]  John T. Stasko,et al.  Knowledge precepts for design and evaluation of information visualizations , 2005, IEEE Transactions on Visualization and Computer Graphics.

[141]  Silvia Miksch,et al.  Gnaeus: Utilizing Clinical Guidelines for Knowledge-assisted Visualisation of EHR Cohorts , 2015, EuroVA@EuroVis.

[142]  Lorie M. Liebrock,et al.  Reversing Compiled Executables for Malware Analysis via Visualization , 2011, Inf. Vis..

[143]  Robert Spence,et al.  Externalising abstract mathematical models , 1996, CHI '96.

[144]  P. S. Sastry,et al.  A survey of temporal data mining , 2006 .

[145]  Markus Wagner,et al.  Visual Analytics : Foundations and Experiences in Malware Analysis , 2018 .

[146]  Karl M Newell,et al.  Diagnosing fatigue in gait patterns by support vector machines and self-organizing maps. , 2011, Human movement science.

[147]  Vinod Yegneswaran,et al.  A comparative assessment of malware classification using binary texture analysis and dynamic analysis , 2011, AISec '11.

[148]  Tamara Munzner,et al.  A Multi-Level Typology of Abstract Visualization Tasks , 2013, IEEE Transactions on Visualization and Computer Graphics.

[149]  Kristin A. Cook,et al.  Illuminating the Path: The Research and Development Agenda for Visual Analytics , 2005 .

[150]  Richard May,et al.  Foundations and Frontiers in Visual Analytics , 2009, Inf. Vis..

[151]  Somesh Jha,et al.  Mining specifications of malicious behavior , 2008, ISEC '08.

[152]  Rafael D. C. Santos,et al.  Visualization techniques for malware behavior analysis , 2011, Defense + Commercial Sensing.

[153]  Jarke J. van Wijk,et al.  The value of visualization , 2005, VIS 05. IEEE Visualization, 2005..

[154]  Kevin J Deluzio,et al.  A Global Gait Asymmetry Index. , 2016, Journal of applied biomechanics.

[155]  Denis Lalanne,et al.  Surveying the complementary role of automatic data analysis and visualization in knowledge discovery , 2009, VAKD '09.

[156]  Kurt M. Bischoff Design, Implementation, Use, and Evaluation of Ox: An Attribute- Grammar Compiling System based on Yacc, Lex, and C , 1992 .

[157]  Markus Wagner,et al.  Knowledge-Assisted Rule Building for Malware Analysis , 2016 .

[158]  Dimitrios Tzovaras,et al.  Security for smart mobile networks: The NEMESYS approach , 2013, 2013 IEEE Global High Tech Congress on Electronics.

[159]  John Riedl,et al.  An operator interaction framework for visualization systems , 1998, Proceedings IEEE Symposium on Information Visualization (Cat. No.98TB100258).

[160]  Tamara Munzner,et al.  LiveRAC: interactive visual exploration of system management time-series data , 2008, CHI.

[161]  Juha Lehikoinen,et al.  Refining visualization reference model for context information , 2005, Personal and Ubiquitous Computing.

[162]  Alex Endert,et al.  Toward Theoretical Techniques for Measuring the Use of Human Effort in Visual Analytic Systems , 2017, IEEE Transactions on Visualization and Computer Graphics.

[163]  Lorie M. Liebrock,et al.  Visualizing compiled executables for malware analysis , 2009, 2009 6th International Workshop on Visualization for Cyber Security.

[164]  Margaret-Anne D. Storey,et al.  Creating Visualizations through Ontology Mapping , 2009, 2009 International Conference on Complex, Intelligent and Software Intensive Systems.

[165]  Ben Shneiderman,et al.  The eyes have it: a task by data type taxonomy for information visualizations , 1996, Proceedings 1996 IEEE Symposium on Visual Languages.

[166]  Eul Gyu Im,et al.  Malware analysis using visualized images and entropy graphs , 2014, International Journal of Information Security.

[167]  Arjan Kuijper,et al.  Visual Analysis of Large Graphs: State‐of‐the‐Art and Future Research Challenges , 2011, Eurographics.

[168]  Pat Hanrahan,et al.  Visualization of Heterogeneous Data , 2007, IEEE Transactions on Visualization and Computer Graphics.

[169]  Jeffrey Heer,et al.  prefuse: a toolkit for interactive information visualization , 2005, CHI.

[170]  Tobias Schreck,et al.  Visual Cluster Analysis of Trajectory Data with Interactive Kohonen Maps , 2008, 2008 IEEE Symposium on Visual Analytics Science and Technology.

[171]  Greg,et al.  Security data visualization : graphical techniques for network analysis , 2007 .

[172]  D. F. Andrews,et al.  PLOTS OF HIGH-DIMENSIONAL DATA , 1972 .

[173]  Silvia Miksch,et al.  Hierarchical Temporal Patterns and Interactive Aggregated Views for Pixel-Based Visualizations , 2009, 2009 13th International Conference Information Visualisation.

[174]  Mourad Debbabi,et al.  Cyber Scanning: A Comprehensive Survey , 2014, IEEE Communications Surveys & Tutorials.

[175]  Emden R. Gansner,et al.  Graphviz and Dynagraph – Static and Dynamic Graph Drawing Tools , 2003 .

[176]  Christopher Kirtley,et al.  Clinical Gait Analysis: Theory and Practice , 2006 .

[177]  Gregory J. Conti,et al.  Visual Reverse Engineering of Binary and Data Files , 2008, VizSEC.

[178]  Hans-Peter Kriegel,et al.  'Circle Segments': A Technique for Visually Exploring Large Multidimensional Data Sets , 1996 .

[179]  Jock D. Mackinlay,et al.  Automating the design of graphical presentations of relational information , 1986, TOGS.

[180]  Gennady L. Andrienko,et al.  Exploratory analysis of spatial and temporal data - a systematic approach , 2005 .

[181]  David J. Hand Intelligent Data Analysis: Issues and Opportunities , 1998, Intell. Data Anal..

[182]  Xiaohua Hu,et al.  A Visualization Model of Interactive Knowledge Discovery Systems and Its Implementations , 2003, Inf. Vis..

[183]  Henry L. Owen,et al.  Visual Analysis of Program Flow Data with Data Propagation , 2008, VizSEC.

[184]  Kerstin Blumenstein,et al.  PubViz: Lightweight Visual Presentation of Publication Data , 2017, EuroVis.

[185]  Kwan-Liu Ma,et al.  Information and Knowledge assisted analysis and Visualization of large-scale data , 2008, 2008 Workshop on Ultrascale Visualization.

[186]  Charles Perin,et al.  SoccerStories: A Kick-off for Visual Soccer Analysis , 2013, IEEE Transactions on Visualization and Computer Graphics.

[187]  Chaomei Chen,et al.  Top 10 Unsolved Information Visualization Problems , 2005, IEEE Computer Graphics and Applications.

[188]  Leland Wilkinson,et al.  AutoVis: Automatic Visualization , 2010, Inf. Vis..

[189]  Robert Gove,et al.  Detecting malware samples with similar image sets , 2014, VizSEC.

[190]  Tobias Schreck,et al.  TimeSeriesPaths : Projection-Based Explorative Analysis of Multivariate Time Series Data , 2012, WSCG 2012.

[191]  Wolfgang Aigner,et al.  A knowledge-assisted visual malware analysis system: Design, validation, and reflection of KAMAS , 2016, Comput. Secur..

[192]  Min Chen,et al.  Data, Information, and Knowledge in Visualization , 2009, IEEE Computer Graphics and Applications.

[193]  A. Leardini,et al.  Data management in gait analysis for clinical applications. , 1998, Clinical biomechanics.

[194]  Fernando Vieira Paulovich,et al.  Nmap: A Novel Neighborhood Preservation Space-filling Algorithm , 2014, IEEE Transactions on Visualization and Computer Graphics.

[195]  Daniel A. Keim,et al.  A Survey of Visualization Systems for Malware Analysis , 2015, EuroVis.

[196]  Stefan Bruckner,et al.  Smart super views — A knowledge-assisted interface for medical visualization , 2012, 2012 IEEE Conference on Visual Analytics Science and Technology (VAST).

[197]  Aditya P. Mathur,et al.  A Survey of Malware Detection Techniques , 2007 .

[198]  Srinivas Mukkamala,et al.  Visualization techniques for efficient malware detection , 2013, 2013 IEEE International Conference on Intelligence and Security Informatics.

[199]  Georges G. Grinstein,et al.  Iconographic Displays For Visualizing Multidimensional Data , 1988, Proceedings of the 1988 IEEE International Conference on Systems, Man, and Cybernetics.

[200]  Yuval Shahar,et al.  Temporal Information Systems in Medicine , 2010 .

[201]  Benjamin J. Kadlec,et al.  Knowledge-Assisted Visualization and Segmentation of Geologic Features , 2010, IEEE Computer Graphics and Applications.

[202]  Nooritawati Md Tahir,et al.  Parkinson Disease gait classification based on machine learning approach , 2012 .

[203]  Florian Windhager,et al.  Should we Dream the Impossible Dream of Reproducibility in Visual Analytics Evaluation? , 2015, EuroRV³@EuroVis.

[204]  Felix C. Freiling,et al.  Toward Automated Dynamic Malware Analysis Using CWSandbox , 2007, IEEE Secur. Priv..

[205]  Robert Gove,et al.  SEEM: a scalable visualization for comparing multiple large sets of attributes for malware analysis , 2014, VizSEC.

[206]  Jeffrey Johnson,et al.  Designing with the mind in mind : simple guide to understanding user interface design guidelines , 2014 .

[207]  Roland H. C. Yap,et al.  Experiments with Malware Visualization , 2012, DIMVA.

[208]  Mohd Aizaini Maarof,et al.  Malware behavior image for malware variant identification , 2014, 2014 International Symposium on Biometrics and Security Technologies (ISBAST).

[209]  Min Chen,et al.  What May Visualization Processes Optimize? , 2015, IEEE Transactions on Visualization and Computer Graphics.

[210]  Kuinam J. Kim,et al.  A Study on Malicious Codes Pattern Analysis Using Visualization , 2011, 2011 International Conference on Information Science and Applications.

[211]  Pat Hanrahan,et al.  Show Me: Automatic Presentation for Visual Analysis , 2007, IEEE Transactions on Visualization and Computer Graphics.

[212]  Jeffrey Heer,et al.  A tour through the visualization zoo , 2010, ACM Queue.

[213]  U. Bayer,et al.  TTAnalyze: A Tool for Analyzing Malware , 2006 .

[214]  R. Major Biomechanics of the Musculo-Skeletal System , 1994 .

[215]  Daniel A. Keim,et al.  Information Visualization and Visual Data Mining , 2002, IEEE Trans. Vis. Comput. Graph..

[216]  Silvia Miksch,et al.  A matter of time: Applying a data-users-tasks design triangle to visual analytics of time-oriented data , 2014, Comput. Graph..

[217]  J. B. Brooke,et al.  SUS: A 'Quick and Dirty' Usability Scale , 1996 .

[218]  Daniel A. Keim,et al.  Real-time visual analytics for event data streams , 2012, SAC '12.

[219]  Hans-Peter Kriegel,et al.  Recursive pattern: a technique for visualizing very large amounts of data , 1995, Proceedings Visualization '95.

[220]  Silvia Miksch,et al.  Exploring highly structured data: a comparative study of stardinates and parallel coordinates , 2005, Ninth International Conference on Information Visualisation (IV'05).

[221]  Philip T. Kortum,et al.  Determining what individual SUS scores mean: adding an adjective rating scale , 2009 .

[222]  Arjan Kuijper,et al.  A Reference Model for Adaptive Visualization Systems , 2011, HCI.

[223]  Ed H. Chi,et al.  A taxonomy of visualization techniques using the data state reference model , 2000, IEEE Symposium on Information Visualization 2000. INFOVIS 2000. Proceedings.

[224]  Martin Pirker,et al.  A Work-Flow for Empirical Exploration of Security Events , 2016, WWW.

[225]  M. Sheelagh T. Carpendale,et al.  Empirical Studies in Information Visualization: Seven Scenarios , 2012, IEEE Transactions on Visualization and Computer Graphics.