4.7 Article

Visual Analytics of Anomalous User Behaviors: A Survey

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Software Engineering

Lessons Learned Developing a Visual Analytics Solution for Investigative Analysis of Scamming Activities

Jay Koven et al.

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS (2019)

Article Computer Science, Software Engineering

A Visual Analytics Framework for the Detection of Anomalous Call Stack Trees in High Performance Computing Applications

Cong Xie et al.

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS (2019)

Article Computer Science, Software Engineering

Situ: Identifying and Explaining Suspicious Behavior in Networks

John R. Goodall et al.

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS (2019)

Article Computer Science, Artificial Intelligence

A visual analytics system to support tax evasion discovery

Walter Didimo et al.

DECISION SUPPORT SYSTEMS (2018)

Article Computer Science, Software Engineering

Data Flow Analysis and Visualization for Spatiotemporal Statistical Data without Trajectory Information

Seokyeon Kim et al.

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS (2018)

Article Computer Science, Software Engineering

Voila: Visual Anomaly Detection and Monitoring with Streaming Spatiotemporal Data

Nan Cao et al.

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS (2018)

Article Computer Science, Software Engineering

EVA: Visual Analytics to Identify Fraudulent Events

Roger A. Leite et al.

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS (2018)

Article Computer Science, Software Engineering

Bring it to the Pitch: Combining Video and Movement Data to Enhance Team Sport Analysis

Manuel Stein et al.

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS (2018)

Article Computer Science, Software Engineering

A Novel Radial Visualization of Intrusion Detection Alerts

Yang Shi et al.

IEEE COMPUTER GRAPHICS AND APPLICATIONS (2018)

Article Multidisciplinary Sciences

The spread of low-credibility content by social bots

Chengcheng Shao et al.

NATURE COMMUNICATIONS (2018)

Proceedings Paper Engineering, Electrical & Electronic

Visual Analysis of Collective Anomalies Through High-Order Correlation Graph

Jun Tao et al.

2018 IEEE PACIFIC VISUALIZATION SYMPOSIUM (PACIFICVIS) (2018)

Proceedings Paper Engineering, Electrical & Electronic

FraudVis: Understanding Unsupervised Fraud Detection Algorithms

Jiao Sun et al.

2018 IEEE PACIFIC VISUALIZATION SYMPOSIUM (PACIFICVIS) (2018)

Article Computer Science, Software Engineering

Patterns and Sequences: Interactive Exploration of Clickstreams to Understand Common Visitor Paths

Zhicheng Liu et al.

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS (2017)

Article Chemistry, Multidisciplinary

A Visual Analytics Approach for Detecting and Understanding Anomalous Resident Behaviors in Smart Healthcare

Zhifang Liao et al.

APPLIED SCIENCES-BASEL (2017)

Article Computer Science, Software Engineering

Social Media Visual Analytics

Siming Chen et al.

COMPUTER GRAPHICS FORUM (2017)

Article Computer Science, Software Engineering

A Survey on Visual Analysis Approaches for Financial Data

S. Ko et al.

COMPUTER GRAPHICS FORUM (2016)

Article Computer Science, Software Engineering

Episogram: Visual Summarization of Egocentric Social Interactions

Nan Cao et al.

IEEE COMPUTER GRAPHICS AND APPLICATIONS (2016)

Article Computer Science, Artificial Intelligence

Suspicious Behavior Detection: Current Trends and Future Directions

Meng Jiang et al.

IEEE INTELLIGENT SYSTEMS (2016)

Article Computer Science, Information Systems

A Survey on Visual Analytics of Social Media Data

Yingcai Wu et al.

IEEE TRANSACTIONS ON MULTIMEDIA (2016)

Article Computer Science, Software Engineering

Visual Analysis of Cloud Computing Performance Using Behavioral Lines

Chris Muelder et al.

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS (2016)

Article Computer Science, Software Engineering

TargetVue: Visual Analysis of Anomalous User Behaviors in Online Communication Systems

Nan Cao et al.

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS (2016)

Article Computer Science, Software Engineering

TelCoVis: Visual Exploration of Co-occurrence in Urban Human Mobility Based on Telco Data

Wenchao Wu et al.

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS (2016)

Article Computer Science, Artificial Intelligence

Graph based anomaly detection and description: a survey

Leman Akoglu et al.

DATA MINING AND KNOWLEDGE DISCOVERY (2015)

Proceedings Paper Computer Science, Theory & Methods

Layer-Centered Approach for Multigraphs Visualization

Denis Redondo et al.

2015 19TH INTERNATIONAL CONFERENCE ON INFORMATION VISUALISATION IV 2015 (2015)

Article Computer Science, Software Engineering

Public behavior response analysis in disaster events utilizing visual analytics of microblog data

Junghoon Chae et al.

COMPUTERS & GRAPHICS-UK (2014)

Article Computer Science, Software Engineering

#FluxFlow: Visual Analysis of Anomalous Information Spreading on Social Media

Jian Zhao et al.

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS (2014)

Article Computer Science, Software Engineering

Dynamic Network Visualization with Extended Massive Sequence Views

Stef van den Elzen et al.

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS (2014)

Article Computer Science, Interdisciplinary Applications

MVSec: multi-perspective and deductive visual analytics on heterogeneous network security data

Ying Zhao et al.

JOURNAL OF VISUALIZATION (2014)

Article Computer Science, Artificial Intelligence

Fraud detection using self-organizing map visualizing the user profiles

Dominik Olszewski

KNOWLEDGE-BASED SYSTEMS (2014)

Article Transportation Science & Technology

Characterising group-cycling journeys using interactive graphics

Roger Beecham et al.

TRANSPORTATION RESEARCH PART C-EMERGING TECHNOLOGIES (2014)

Article Engineering, Multidisciplinary

Visual Analytics for cyber security and intelligence

Valerie Lavigne et al.

JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS (2014)

Proceedings Paper Computer Science, Theory & Methods

Visualization and Analysis of Parallel Dataflow Execution with Smart Traces

Daniel K. Osmari et al.

2014 27TH SIBGRAPI CONFERENCE ON GRAPHICS, PATTERNS AND IMAGES (SIBGRAPI) (2014)

Article Computer Science, Artificial Intelligence

A visual analytics framework for spatio-temporal analysis and modelling

Natalia Andrienko et al.

DATA MINING AND KNOWLEDGE DISCOVERY (2013)

Article Engineering, Electrical & Electronic

Understanding User Behavior in Online Social Networks: A Survey

Long Jin et al.

IEEE COMMUNICATIONS MAGAZINE (2013)

Article Computer Science, Artificial Intelligence

Preventing Private Information Inference Attacks on Social Networks

Raymond Heatherly et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2013)

Article Computer Science, Software Engineering

Combining Computational Analyses and Interactive Visualization for Document Exploration and Sensemaking in Jigsaw

Carsten Goerg et al.

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS (2013)

Article Computer Science, Software Engineering

Visual Exploration of Big Spatio-Temporal Urban Data: A Study of New York City Taxi Trips

Nivan Ferreira et al.

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS (2013)

Article Computer Science, Software Engineering

ScatterBlogs2: Real-Time Monitoring of Microblog Messages Through User-Guided Filtering

Harald Bosch et al.

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS (2013)

Article Computer Science, Software Engineering

Examining the Use of a Visual Analytics System for Sensemaking Tasks: Case Studies with Domain Experts

Youn-ah Kang et al.

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS (2012)

Article Computer Science, Software Engineering

EventRiver: Visually Exploring Text Collections with Temporal References

Dongning Luo et al.

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS (2012)

Article Computer Science, Software Engineering

A Survey of Visualization Systems for Network Security

Hadi Shiravi et al.

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS (2012)

Article Computer Science, Software Engineering

Visual Analytics Methodology for Eye Movement Studies

Gennady Andrienko et al.

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS (2012)

Article Computer Science, Software Engineering

DICON: Interactive Visual Analysis of Multidimensional Clusters

Nan Cao et al.

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS (2011)

Article Computer Science, Software Engineering

CloudLines: Compact Display of Event Episodes in Multiple Time-Series

Milos Krstajic et al.

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS (2011)

Article Computer Science, Software Engineering

A Visual Analytics Approach to Understanding Spatiotemporal Hotspots

Ross Maciejewski et al.

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS (2010)

Article Computer Science, Theory & Methods

Anomaly detection

Varun Chandola et al.

ACM COMPUTING SURVEYS (2009)

Article Computer Science, Software Engineering

Challenges for visual analytics

Jim Thomas et al.

INFORMATION VISUALIZATION (2009)

Article Computer Science, Software Engineering

Scalable and interactive visual analysis of financial wire transactions for fraud detection

Remco Chang et al.

INFORMATION VISUALIZATION (2008)

Article Computer Science, Software Engineering

Toward a deeper understanding of the role of interaction in information visualization

Ji Soo Yi et al.

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS (2007)

Article Computer Science, Software Engineering

Visual analysis of network traffic for resource planning, interactive monitoring, and interpretation of security threats

Florian Mansmann et al.

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS (2007)

Article Computer Science, Software Engineering

Visual discovery in computer network defense

Anita D. D'Amico et al.

IEEE COMPUTER GRAPHICS AND APPLICATIONS (2007)

Article Computer Science, Hardware & Architecture

An overview of anomaly detection techniques: Existing solutions and latest technological trends

Animesh Patcha et al.

COMPUTER NETWORKS (2007)

Proceedings Paper Computer Science, Artificial Intelligence

SpiralView: Towards security policies assessment through visual correlation of network resources with evolution of alarms

Enrico Bertini et al.

VAST: IEEE SYMPOSIUM ON VISUAL ANALYTICS SCIENCE AND TECHNOLOGY 2007, PROCEEDINGS (2007)

Article Computer Science, Software Engineering

Interactive exploration of data traffic with hierarchical network maps

Florian Mansmann et al.

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS (2006)

Article Computer Science, Software Engineering

Balancing systematic and flexible exploration of social networks

Adam Perer et al.

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS (2006)

Article Computer Science, Software Engineering

Visual correlation of network alerts

S Foresti et al.

IEEE COMPUTER GRAPHICS AND APPLICATIONS (2006)

Article Computer Science, Software Engineering

Intrusion and misuse detection in large-scale systems

RF Erbacher et al.

IEEE COMPUTER GRAPHICS AND APPLICATIONS (2002)