Visual Analytics Applications for Cyber Security and Intelligence
暂无分享,去创建一个
[1] Martin J. Alperen. The Department of Homeland Security , 2011 .
[2] Joonghoon Lee. Exploring global terrorism data , 2008, ACM Crossroads.
[3] Daniel R. Tesone,et al. Achieving Cyber Defense Situational Awareness: A Cognitive Task Analysis of Information Assurance Analysts , 2005 .
[4] Jock D. Mackinlay,et al. The information visualizer, an information workspace , 1991, CHI.
[5] C. Chabris,et al. Gorillas in Our Midst: Sustained Inattentional Blindness for Dynamic Events , 1999, Perception.
[6] Robert B. Miller,et al. Response time in man-computer conversational transactions , 1899, AFIPS Fall Joint Computing Conference.
[7] Edward R. Tufte,et al. Envisioning Information , 1990 .
[8] Ben Shneiderman,et al. The eyes have it: a task by data type taxonomy for information visualizations , 1996, Proceedings 1996 IEEE Symposium on Visual Languages.
[9] Daniel A. Keim,et al. Visual support for analyzing network traffic and intrusion detection events using TreeMap and graph representations , 2009, CHIMIT.
[10] John T. Stasko,et al. Dust & Magnet: Multivariate Information Visualization Using a Magnet Metaphor , 2005, Inf. Vis..
[11] Colin Ware,et al. Information Visualization: Perception for Design , 2000 .
[12] Ben Shneiderman,et al. Readings in information visualization - using vision to think , 1999 .