-
Notifications
You must be signed in to change notification settings - Fork 1
/
entries.json.txt
10 lines (10 loc) · 6.88 KB
/
entries.json.txt
1
2
3
4
5
6
7
8
9
10
{"_id":{"$oid":"61c0aa1373a2b6bfd329a256"},"shortTitle":"A Visualization Interface to Improve the Transparency of Collected Personal Data on the Internet","year":2020,"author":"Marija Schufrin, Steven Lamarr Reynolds, Arjan Kuijper, Jörn Kohlhammer","categories":["PR.AT","PR.IP","consume","produce","manipulate","introduce","semi-automatic","scatter plot","bubble chart","time line","2D","discrete","closed source","web app"],"reference":"M. Schufrin, S. L. Reynolds, A. Kuijper and J. Kohlhammer, \"A Visualization Interface to Improve the Transparency of Collected Personal Data on the Internet,\" 2020 IEEE Symposium on Visualization for Cyber Security (VizSec), 2020, pp. 1-10.","URL":"http://dx.doi.org/10.1109/VizSec51108.2020.00007","created":{"$date":"2021-12-20T16:06:43.652Z"},"__v":0}
{"_id":{"$oid":"61c0ab5370e6f788ca1fcfd8"},"shortTitle":"Malware vs Anti-Malware Battle - Gotta Evade ‘em All!","year":2020,"author":"Emily J. Chaffey, Daniele Sgandurra","categories":["PR.AT","DE.CM","RS.AN","produce","encode","automatic","gamification","2D","continuous","open source","concept","script"],"reference":"E. J. Chaffey and D. Sgandurra, \"Malware vs Anti-Malware Battle - Gotta Evade ‘em All!,\" 2020 IEEE Symposium on Visualization for Cyber Security (VizSec), 2020, pp. 40-44.","URL":"http://dx.doi.org/10.1109/VizSec51108.2020.00012","created":{"$date":"2021-12-20T16:12:03.579Z"},"__v":0}
{"_id":{"$oid":"61c0ac3370e6f788ca1fcfdb"},"shortTitle":"Guess Me If You Can: A Visual Uncertainty Model for Transparent Evaluation of Disclosure Risks in Privacy-Preserving Data Visualization","year":2019,"author":"Aritra Dasgupta, Robert Kosara, Min Chen","categories":["ID.RA","DE.DP","RS.MI","RS.IM","produce","introduce","manual","scatter plot","parallel coordinates","2D","3D","discrete","app"],"reference":"A. Dasgupta, R. Kosara and M. Chen, \"Guess Me If You Can: A Visual Uncertainty Model for Transparent Evaluation of Disclosure Risks in Privacy-Preserving Data Visualization,\" 2019 IEEE Symposium on Visualization for Cyber Security (VizSec), 2019, pp. 1-10.","URL":"http://dx.doi.org/10.1109/VizSec48167.2019.9161608","created":{"$date":"2021-12-20T16:15:47.816Z"},"__v":0}
{"_id":{"$oid":"61c0acd970e6f788ca1fcfde"},"shortTitle":"PunyVis: A Visual Analytics Approach for Identifying Homograph Phishing Attacks","year":2019,"author":"Brett Fouss, Dennis Ross, Allan Wollaber, Steven R Gomez","categories":["ID.RA","PR.DS","PR.PT","DE.AE","AV.PH","search","query","manipulate","encode","semi-automatic","table","bar chart","tree map","2D","3D","hierarchical","discrete","closed source","web app"],"reference":"B. Fouss, D. M. Ross, A. B. Wollaber and S. R. Gomez, \"PunyVis: A Visual Analytics Approach for Identifying Homograph Phishing Attacks,\" 2019 IEEE Symposium on Visualization for Cyber Security (VizSec), 2019, pp. 1-10.","URL":"http://dx.doi.org/10.1109/VizSec48167.2019.9161590","created":{"$date":"2021-12-20T16:18:33.902Z"},"__v":0}
{"_id":{"$oid":"61c0b32029df906db94da6b2"},"shortTitle":"Visual Analytics for Root DNS Data","year":2018,"author":"Eric Krokos, Alexander R Rowden, Kirsten Whitley, Amitabh Varshney","categories":["PR.AT","PR.PT","DE.CM","AV.DoS","search","query","introduce","automatic","time line","network","nD","continuous","closed source","app"],"reference":"E. Krokos, A. Rowden, K. Whitley and A. Varshney, \"Visual Analytics for Root DNS Data,\" 2018 IEEE Symposium on Visualization for Cyber Security (VizSec), 2018, pp. 1-8","URL":"http://dx.doi.org/10.1109/VIZSEC.2018.8709205","created":{"$date":"2021-12-20T16:45:20.121Z"},"__v":0}
{"_id":{"$oid":"61c0b3b229df906db94da6b5"},"shortTitle":"Visual-Interactive Identification of Anamolous IP-Block Behavior Using Geo-IP Data","year":2018,"author":"Alex Ulmer, Marija Schufrin, David Sessler, Jörn Kohlhammer","categories":["ID.RA","DE.AE","DE.DP","AV.MC","search","query","manipulate","introduce","semi-automatic","table","time line","2D","geographic-based","continuous","open source","web app"],"reference":"A. Ulmer, M. Schufrin, D. Sessler and J. Kohlhammer, \"Visual-Interactive Identification of Anomalous IP-Block Behavior Using Geo-IP Data,\" 2018 IEEE Symposium on Visualization for Cyber Security (VizSec), 2018, pp. 1-8.","URL":"http://dx.doi.org/10.1109/VIZSEC.2018.8709182","created":{"$date":"2021-12-20T16:47:46.822Z"},"__v":0}
{"_id":{"$oid":"61c0b46e29df906db94da6ba"},"shortTitle":"STARLORD: Linked security data exploration in a 3D graph","year":2017,"author":"Leichtnam Laetitia, Totel Éric, Prigent Nicolas, Mé Ludovic","categories":["DE.DP","RS.AN","produce","query","introduce","semi-automatic","network","3D","graph-based","discrete","web app"],"reference":"L. Leichtnam, É. Totel, N. Prigent and L. Mé, \"STARLORD: Linked security data exploration in a 3D graph,\" 2017 IEEE Symposium on Visualization for Cyber Security (VizSec), 2017, pp. 1-4.","URL":"http://dx.doi.org/10.1109/VIZSEC.2017.8062203","created":{"$date":"2021-12-20T16:50:54.718Z"},"__v":0}
{"_id":{"$oid":"61c0b52129df906db94da6bd"},"shortTitle":"Firewall ruleset visualization analysis tool based on segmentation","year":2017,"author":"Kim Hyungseok, Ko Sukjun, Kim Dong Seong, Kim Huy Kang","categories":["PR.AC","PR.PT","DE.AE","DE.CM","AV.MC","consume","query","introduce","semi-automatic","bar chart","3D","continuous","closed source","web app"],"reference":"H. Kim, S. Ko, D. S. Kim and H. K. Kim, \"Firewall ruleset visualization analysis tool based on segmentation,\" 2017 IEEE Symposium on Visualization for Cyber Security (VizSec), 2017, pp. 1-8.","URL":"http://dx.doi.org/10.1109/VIZSEC.2017.8062196","created":{"$date":"2021-12-20T16:53:53.54Z"},"__v":0}
{"_id":{"$oid":"61c0b59d29df906db94da6c0"},"shortTitle":"Cesar: Visual representation of source code vulnerabilities","year":2016,"author":"Assal Hala, Chiasson Sonia, Biddle Robert","categories":["ID.RA","PR.DS","PR.MA","DE.CM","DE.DP","AV.DF","consume","encode","semi-automatic","tree map","2D","3D","discrete","closed source","web app"],"reference":"H. Assal, S. Chiasson and R. Biddle, \"Cesar: Visual representation of source code vulnerabilities,\" 2016 IEEE Symposium on Visualization for Cyber Security (VizSec), 2016, pp. 1-8.","URL":"http://dx.doi.org/10.1109/VIZSEC.2016.7739576","created":{"$date":"2021-12-20T16:55:57.233Z"},"__v":0}
{"_id":{"$oid":"61c0b8f729df906db94da6c3"},"shortTitle":"J-Viz: Finding algorithmic complexity attacks via graph visualization of Java bytecode","year":2016,"author":"Alam Md. Jawaherul, Goodrich Michael T., Johnson Timothy","categories":["ID.RA","DE.DP","AV.DF","consume","introduce","encode","semi-automatic","network","hierarchical","graph-based","discrete","closed source","app"],"reference":"M. J. Alam, M. T. Goodrich and T. Johnson, \"J-Viz: Finding algorithmic complexity attacks via graph visualization of Java bytecode,\" 2016 IEEE Symposium on Visualization for Cyber Security (VizSec), 2016, pp. 1-8.","URL":"http://dx.doi.org/10.1109/VIZSEC.2016.7739575","created":{"$date":"2021-12-20T17:10:15.224Z"},"__v":0}