More than ever, we rely on computer systems and the availability of computer networks. It is crucial to have a high standard of security in this modern world. Fully-automated systems to identify threats on the Internet are not enough to provide awareness of the actual situation of complex computer networks. Especially advanced persistent threats stay undetected for too long. Providing interactive visual interfaces in combination with analytical methods, help analysts and system administrators to get a better impression of possible symptoms, suspicious behavior, and understand complex dependencies to enhance cyber security. To achieve this goal, we implement and evaluate novel visual analytics systems to facilitate exploration of network act...
The analysis of data streams is important in many security-related domains to gain situational aware...
The flood of raw data generated by intrusion detection and other network monitoring devices can be s...
The timely and reliable data transfer required by many networked applications necessitates the devel...
Effective visual analysis of computer network defense (CND) information is challenging due to the vo...
Abstract The ever-increasing amount of major security incidents has led to an emerging interest in c...
Securing the highly complex infrastructures of modern organizations against innovative and targeted ...
A comprehensive analysis of cyber attacks is important for better understanding of their nature and ...
Software vulnerabilities represent one of the main weaknesses of an Information Technology (IT) syst...
Network Intrusion Detection System (NIDS) is a security system that monitors the network traffic and...
Situational awareness is a key concept in cyber-defence. Its goal is to make the user aware of diffe...
The analysis and exploration of emerging threats in the Internet is important to better understand t...
The analysis and exploration of emerging threats in the Internet is important to better understand t...
The Internet has become a dangerous place: malicious code gets spread on personal comput-ers across ...
Despite the application of increasingly advanced methods and technologies to automate tasks within c...
This paper describes a web-based visualization system de-signed for network security analysts at the...
The analysis of data streams is important in many security-related domains to gain situational aware...
The flood of raw data generated by intrusion detection and other network monitoring devices can be s...
The timely and reliable data transfer required by many networked applications necessitates the devel...
Effective visual analysis of computer network defense (CND) information is challenging due to the vo...
Abstract The ever-increasing amount of major security incidents has led to an emerging interest in c...
Securing the highly complex infrastructures of modern organizations against innovative and targeted ...
A comprehensive analysis of cyber attacks is important for better understanding of their nature and ...
Software vulnerabilities represent one of the main weaknesses of an Information Technology (IT) syst...
Network Intrusion Detection System (NIDS) is a security system that monitors the network traffic and...
Situational awareness is a key concept in cyber-defence. Its goal is to make the user aware of diffe...
The analysis and exploration of emerging threats in the Internet is important to better understand t...
The analysis and exploration of emerging threats in the Internet is important to better understand t...
The Internet has become a dangerous place: malicious code gets spread on personal comput-ers across ...
Despite the application of increasingly advanced methods and technologies to automate tasks within c...
This paper describes a web-based visualization system de-signed for network security analysts at the...
The analysis of data streams is important in many security-related domains to gain situational aware...
The flood of raw data generated by intrusion detection and other network monitoring devices can be s...
The timely and reliable data transfer required by many networked applications necessitates the devel...