
Conf. Big Data Sec. Cloud (BigDataSecurity), IEEE
Int. Conf. High Perf. Smart Comp. (HPSC), and IEEE
Int. Conf. on Int. Data Sec. (IDS), pages 61–66.
Chen, H. (2004). Compound brushing explained. Informa-
tion Visualization, 3(2):96–108.
D’Amico, A., Buchanan, L., Kirkpatrick, D., and Walczak,
P. (2016). Cyber operator perspectives on security vi-
sualization. In Nicholson, D., editor, Advances in Hu-
man Factors in Cybersecurity, pages 69–81, Cham.
Springer Int. Publishing.
Doleisch, H., Gasser, M., and Hauser, H. (2003). Inter-
active feature specification for focus+context visual-
ization of complex simulation data. In VisSym, pages
239–302. The Eurographics Association.
Ester, M., Kriegel, H.-P., Sander, J., and Xu, X. (1996).
A density-based algorithm for discovering clusters in
large spatial databases with noise. In Proc. Int. Conf.
Know. Disc. Data Mining, KDD’96, pages 226––231.
AAAI Press.
Fails, J. A. and Olsen, D. R. (2003). Interactive machine
learning. In Proc. of the Int. Conf. on Intelligent User
Interfaces, pages 39–45.
Gates, C. and Engle, S. (2013). Reflecting on visualization
for cyber security. In IEEE Int. Conf. on Intelligence
and Security Informatics, pages 275–277.
Gove, R. (2022). Automatic narrative summarization for
visualizing cyber security logs and incident reports.
IEEE Trans. Vis. Comp. Graph., 28(1):1182–1190.
Hong, J., Lee, J., Lee, H., Chang, Y., Choi, K., and Cha,
S. K. (2019). AlertVision: Visualizing security alerts.
In Kang, B. B. and Jang, J., editors, Information Secu-
rity Applications, pages 173–184, Cham. Springer Int.
Publishing.
Jiang, L., Jayatilaka, A., Nasim, M., Grobler, M., Zahedi,
M., and Babar, M. A. (2022). Systematic literature
review on cyber situational awareness visualizations.
IEEE Access, 10:57525–57554.
Koch, S., Bosch, H., Giereth, M., and Ertl, T. (2011). It-
erative integration of visual insights during scalable
patent search and analysis. IEEE Trans. Vis. Comp.
Graph., 17(5):557–569.
Komadina, A., Mihajlovi
´
c,
ˇ
Z., and Gro
ˇ
s, S. (2022). Analy-
sis of the design space for cybersecurity visualizations
in vizsec. In IEEE Symp. Vis. Cyber Sec., pages 1–11.
Lavigne, V. and Gouin, D. (2014). Visual analytics for cy-
ber security and intelligence. The Journal of Defense
Modeling and Simulation, 11(2):175–199.
Macedo, I., Wanous, S., Oliveira, N., Sousa, O., and Prac¸a,
I. (2021). A tool to support the investigation and visu-
alization of cyber and/or physical incidents. In Trends
Appl. Inf. Sys. Tech., pages 130–140, Cham. Springer
Int. Publishing.
Marchionini, G. (2006). Exploratory search: From finding
to understanding. Commun. ACM, 49(4):41–46.
Martin, A. R. and Ward, M. O. (1995). High dimen-
sional brushing for interactive exploration of multi-
variate data. In Visualization ’95, pages 271–278, Los
Alamitos. IEEE Computer Society Press.
McInnes, L., Healy, J., Saul, N., and Großberger, L. (2018).
UMAP: uniform manifold approximation and projec-
tion. Journal of Open Source Software, 3(29):861.
Pavlenko, E. Y., Eremenko, I. S., and Fatin, A. D. (2022).
Computer network clustering methods in cybersecu-
rity problems. Automatic Control and Computer Sci-
ences, 56(8):957–963.
Raj, C., Khular, L., and Raj, G. (2020). Clustering based in-
cident handling for anomaly detection in cloud infras-
tructures. In Int. Conf. Cloud Comp., Data Science &
Engineering, pages 611–616.
Riddle-Workman, E., Evangelou, M., and Adams, N. M.
(2021). Multi-type relational clustering for enterprise
cyber-security networks. Pattern Recognition Letters,
149:172–178.
Roberts, J. C. and Wright, M. (2006). Towards ubiquitous
brushing for information visualization. In Banissi, E.,
editor, Information Visualization, pages 151–156, Los
Alamitos, Calif. IEEE Computer Society.
Sedlmair, M., Meyer, M., and Munzner, T. (2012). Design
study methodology: Reflections from the trenches
and the stacks. IEEE Trans. Vis. Comp. Graph.,
18(12):2431–2440.
Shi, Y., Zhao, Y., Zhou, F., Shi, R., Zhang, Y., and Wang,
G. (2018). A novel radial visualization of intrusion
detection alerts. IEEE Comp. Graph. App., 38(6):83–
95.
Shneiderman, B. (2003). The eyes have it: A task by data
type taxonomy for information visualizations. In The
Craft of Information Visualization, pages 364–371.
Elsevier.
Silva, D., Dell’Amico, M., Hart, M., Roundy, K. A., and
Kats, D. (2018). Hierarchical incident clustering for
security operation centers. In Proc. of KDD Workshop
on Interactive Data Exploration and Analytics. ACM.
Van der Maaten, L. and Hinton, G. (2008). Visualizing data
using t-sne. Journal of Machine Learning Research,
9(11).
Wenskovitch, J., Fallon, C., Miller, K., and Dasgupta, A.
(2021). Beyond visual analytics: Human-machine
teaming for ai-driven data sensemaking. In IEEE
Workshop on TRust and EXpertise in Visual Analyt-
ics, pages 40–44.
White, R. W. and Roth, R. A. (2009). Exploratory search:
Beyond the query-response paradigm, volume 1. Mor-
gan & Claypool Publishers.
AlertSets: Supporting Exploratory Analysis of Cybersecurity Alerts Through Set Interactions
787