2017 IEEE Symposium on Visualization for Cyber Security (VizSec) 2017
DOI: 10.1109/vizsec.2017.8062200
|View full text |Cite
|
Sign up to set email alerts
|

Toward a visualization-supported workflow for cyber alert management using threat models and human-centered design

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0
1

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(12 citation statements)
references
References 27 publications
0
11
0
1
Order By: Relevance
“…However, they focus on interactive visualizations, but not on XAI methods. In [46], the authors focus on developing a visual analytics tool for supporting cyber analysts in making decisions when dealing with intrusion detection alerts. However, the authors also do not consider explanations in XAI.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, they focus on interactive visualizations, but not on XAI methods. In [46], the authors focus on developing a visual analytics tool for supporting cyber analysts in making decisions when dealing with intrusion detection alerts. However, the authors also do not consider explanations in XAI.…”
Section: Related Workmentioning
confidence: 99%
“…In summary, it is observed in [38,39,41,42] proposals aiming for the integration of explanations in a fraud detection context. Within visual analytics literature, it is also observed studies aiming to support the decision-making of fraud experts through visualizations [21,45,46]. However, a social and user-centered perspective has been lacking in those works, by first understanding the needs of fraud experts for explanations This is an open access post-print version; the final authenticated version is available online at https://link.springer.com/chapter/10.1007/978-3-030-57321-8_18 by © IFIP International Federation for Information Processing 2020.…”
Section: Related Workmentioning
confidence: 99%
“…Most of an analyst's time is spent responding to incidents which usually have priority over exploring data for new attacks (Franklin et al, 2017). When analysts use exploratory data analysis, they can both respond to current alerts as well as answer hypothesis about the broader set at the same time.…”
Section: Cybersecurity Visualizationsmentioning
confidence: 99%
“…NStreamAware [9] leverages timelines with sliding slices and feature selection. L. Franklin et al propose a design for an alerts management system resulting in an inbox metaphor prototype [10], with mail displayed on a timeline. In our proposition the design integrates the concept of timeline with the different teams and escalation process of SOCs.…”
Section: Related Workmentioning
confidence: 99%