2020
DOI: 10.1109/tbdata.2020.2964169
|View full text |Cite
|
Sign up to set email alerts
|

Visual Analytics of Anomalous User Behaviors: A Survey

Abstract: The increasing accessibility of data provides substantial opportunities for understanding user behaviors. Unearthing anomalies in user behaviors is of particular importance as it helps signal harmful incidents such as network intrusions, terrorist activities, and financial frauds. Many visual analytics methods have been proposed to help understand user behaviorrelated data in various application domains. In this work, we survey the state of art in visual analytics of anomalous user behaviors and classify them … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(9 citation statements)
references
References 134 publications
(378 reference statements)
0
9
0
Order By: Relevance
“…The works of [13,33,64,65,66] were selected based on these criteria. Given the intersection with visual analytics literature for decision-making in fraud, we also adopt terminology from this domain for our systematic review based on [21,43] and [67][68][69][70][71][72]. Next, core and most cited surveys This is an open access post-print version; the final authenticated version is available online at https://link.springer.com/chapter/10.1007/978-3-030-57321-8_18 by © IFIP International Federation for Information Processing 2020.…”
Section: Validation Of Fraud Scenariosmentioning
confidence: 99%
See 1 more Smart Citation
“…The works of [13,33,64,65,66] were selected based on these criteria. Given the intersection with visual analytics literature for decision-making in fraud, we also adopt terminology from this domain for our systematic review based on [21,43] and [67][68][69][70][71][72]. Next, core and most cited surveys This is an open access post-print version; the final authenticated version is available online at https://link.springer.com/chapter/10.1007/978-3-030-57321-8_18 by © IFIP International Federation for Information Processing 2020.…”
Section: Validation Of Fraud Scenariosmentioning
confidence: 99%
“…This is an open access post-print version; the final authenticated version is available online at https://link.springer.com/chapter/10.1007/978-3-030-57321-8_18 by © IFIP International Federation for Information Processing 2020. [22,36,43,44,55,68,71,72,80,88,89,92,93,95,96,97,98,101,102,103,104,105,106,107] 24 Yes…”
Section: Usage Of Scenarios For Requirements Elicitation For Explanatmentioning
confidence: 99%
“…Yang et al [22] presented a comprehensive survey of visual analytics of anomalous user behaviors and classified them into four categories: social interaction, travel, network communication, and transaction. They also categorized visualization techniques that have been applied to anomalous user behaviors, including, among others: sequence (illustrates the relations between successive events with temporal information); graph (shows structured patterns composed of nodes and edges); chart (represents the attributes of a multidimensional data item using a chart).…”
Section: Visual Analytics and Fraud Auditmentioning
confidence: 99%
“…Concretely, the following research works analyse anomalous user behaviour, anomalous information spread and the use of toxic language. (Shi et al, 2019) carried out a survey on the visual analytics of anomalous user behaviours. The survey revealed four types of user behaviours, including social interaction, travel, network communication and transactions.…”
Section: Visualisations For Monitoring Automatic Annotation Systemsmentioning
confidence: 99%