T., Stuerzlinger, W. & Thomas, B. H. (eds.) Immersive
Analytics. Cham: Springer International Publishing.
Damaye, S. 2010. Forensic Puzzle Contest #4 - Submission.
Davidoff, S. H., Jonathan; Rice, Randi; Fretheim, Scott;
Harrison, David. 2010. Network Forensics Puzzle
Contest: The Curious Mr X [Online]. LMG Security.
Available: http://forensicscontest.com [Accessed 8 May
2019 2019].
Davidoff, S. H., Jonathan; Rice, Randi; Fretheim, Scott;
Harrison, David. 2019. Network Forensics Puzzle
Contest [Online]. LMG Security. Available:
http://forensicscontest.com [Accessed 8 May 2019
2019].
Delfa, E. 2010. Forensic Puzzle Contest #4 - Submission.
Dfrws. 2019. DFRWS Forensic Challenge [Online]. Digital
Forensics Research WorkShop. Available:
https://www.dfrws.org/dfrws-forensic-challenge
[Accessed 2019].
Dwyer, T. & EADES, P. Visualising a fund manager flow
graph with columns and worms. Proceedings Sixth
International Conference on Information Visualisation,
10-12 July 2002 2002. 147-152.
Fischer, F. & Keim, D. Vacs: Visual analytics suite for
cyber security-visual exploration of cyber security
datasets. IEEE VIS, 2013.
Goodall, J. R. Visualization is better! A comparative
evaluation. Visualization for Cyber Security, 2009.
VizSec 2009. 6th International Workshop on, 11-11 Oct.
2009 2009. 57-68.
Graphstreamdevelopers 2018. GraphStream. GraphStream
Devlopers.
Harary, F., Norman, R. Z. & Cartwright, D. 1965.
Structural models: an introduction to the theory of
directed graphs, Wiley.
Jianu, R., Rusu, A., Fabian, A. & Laidlaw, D. 2009. A
Coloring Solution to the Edge Crossing Problem. 13th
International Conference Information Visualisation.
Barcelona, Spain: IEEE.
Jmonkeydevelopers 2017. jMonkeyEngine. jMonkeyEngine
Developers.
Koike, H. 1993. The role of another spatial dimension in
software visualization. ACM Trans. Inf. Syst., 11, 266-
286.
Kollmann, E. 2010. Forensic Puzzle Contest #4 -
Submission.
Krasser, S., CONTI, G., GRIZZARD, J., GRIBSCHAW, J.
& OWEN, H. 2005. Real-Time and Forensic Network
Data Analysis Using Animated and Coordinated
Visualization. 2005 IEEE Workshop on Information
Assurance and Security. United States Military
Academy, West Point, NY.
Lau, S. 2004. The Spinning Cube of Potential Doom.
Commun. ACM, 47, 25-26.
Leichtnam, L., Totel, E., Prigent, N. & MÉ, L. Starlord:
Linked security data exploration in a 3D graph. 2017
IEEE Symposium on Visualization for Cyber Security
(VizSec), 2017. IEEE, 1-4.
Livio, M. 2008. The Golden Ratio: The Story of PHI, the
World's Most Astonishing Number, Crown/Archetype.
Müller, C., Krone, M., Huber, M., Biener, V., Herr, D.,
Koch, S., Reina, G., Weiskopf, D. & ERTL, T. 2018.
Interactive Molecular Graphics for Augmented Reality
Using HoloLens. Journal of Integrative Bioinformatics.
Postel, J. 1990. RFC 791: Internet Protocol, September
1981. Darpa Internet Protocol Specification.
Qosient 2015. Argus. QoSient.
Risch, J. S., Rex, D. B., Dowson, S. T., Walters, T. B., May,
R. A. & MOON, B. D. 1997. The Starlight information
visualization system. Information Visualization, IEEE.
London.
Rotberg, E. 1980. Battlezone. Atari.
Rowley, J. 2007. The wisdom hierarchy: representations of
the DIKW hierarchy. Journal of Information Science,
33, 163-180.
Saavedra, M. & YU, W. 2017. A Comparison between Text,
Parquet, and PCAP Formats for Use in Distributed
Network Flow Analysis on Hadoop. Journal of
Advances in Computer Networks, 5, 59-64.
Shiravi, A., Shiravi, H., Tavallaee, M. & Ghorbani, A. A.
2012. Toward developing a systematic approach to
generate benchmark datasets for intrusion detection.
Computers & Security, 31, 357-374.
Shneiderman, B. 2003. The eyes have it: A task by data type
taxonomy for information visualizations. The craft of
information visualization. Elsevier.
Sommer, B., Barnes, D. G., Boyd, S., Chandler, T., Cordeil,
M., Czauderna, T., Klapperstück, M., Klein, K.,
Nguyen, T. D., Nim, H., Stephens, K., Vohl, D., Wang,
S., Wilson, E., Zhu, Y., LI, J., Mccormack, J., Mariott,
K. & Schreiber, F. 2017. 3D-Stereoscopic Immersive
Analytics Projects at Monash University and University
of Konstanz. Electronic Imaging, 2017, 179-187.
Staheli, D., YU, T., Crouser, R. J., Damodaran, S., Nam, K.,
O'gwynn, D., Mckenna, S. & Harrison, L. 2014.
Visualization evaluation for cyber security: trends and
future directions. Proceedings of the Eleventh
Workshop on Visualization for Cyber Security. Paris,
France: ACM.
Stubler, W. F. & O'hara, J. M. 1996. Human Factors
Challenges for Advanced Process Control. Proceedings
of the Human Factors and Ergonomics Society Annual
Meeting, 40, 992-996.
Tanagho, Y. S., Andriole, G. L., Paradis, A. G., Madison, K.
M., Sandhu, G. S., Varela, J. E. & Benway, B. M. 2012.
2D versus 3D visualization: impact on laparoscopic
proficiency using the fundamentals of laparoscopic
surgery skill set. J Laparoendosc Adv Surg Tech A, 22,
865-70.
WANDA, P. & JIN JIE, H. 2018. A Survey of Intrusion
Detection System, Researchgate.
IVAPP 2020 - 11th International Conference on Information Visualization Theory and Applications
184