{"id":"https://openalex.org/W2889397975","doi":"https://doi.org/10.2312/eurova.20181113","title":"Towards Visual Cyber Security Analytics for the Masses","display_name":"Towards Visual Cyber Security Analytics for the Masses","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2889397975","doi":"https://doi.org/10.2312/eurova.20181113","mag":"2889397975"},"language":"en","primary_location":{"id":"doi:10.2312/eurova.20181113","is_oa":true,"landing_page_url":"https://doi.org/10.2312/eurova.20181113","pdf_url":null,"source":{"id":"https://openalex.org/S7407052899","display_name":"Eurographics","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"article","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.2312/eurova.20181113","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080024341","display_name":"Alex Ulmer","orcid":"https://orcid.org/0009-0008-3778-8184"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Ulmer, Alex","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008337835","display_name":"Marija Schufrin","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Schufrin, Marija","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018698322","display_name":"Hendrik L\u00fccke\u2010Tieke","orcid":"https://orcid.org/0000-0002-0934-6820"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"L\u00fccke-Tieke, Hendrik","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066674692","display_name":"Clindo Devassy Kannanayikkal","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kannanayikkal, Clindo Devassy","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5032433963","display_name":"J\u00f6rn Kohlhammer","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kohlhammer, J\u00f6rn","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5080024341"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"55","last_page":"59"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10799","display_name":"Data Visualization and Analytics","score":0.91839998960495,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10799","display_name":"Data Visualization and Analytics","score":0.91839998960495,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/visual-analytics","display_name":"Visual analytics","score":0.6769699454307556},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.559883713722229},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5497046113014221},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47561222314834595},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.39137211441993713},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3244435787200928},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.17051932215690613}],"concepts":[{"id":"https://openalex.org/C59732488","wikidata":"https://www.wikidata.org/wiki/Q2528440","display_name":"Visual analytics","level":3,"score":0.6769699454307556},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.559883713722229},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5497046113014221},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47561222314834595},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.39137211441993713},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3244435787200928},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17051932215690613}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.2312/eurova.20181113","is_oa":true,"landing_page_url":"https://doi.org/10.2312/eurova.20181113","pdf_url":null,"source":{"id":"https://openalex.org/S7407052899","display_name":"Eurographics","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"},{"id":"mag:2889397975","is_oa":false,"landing_page_url":"https://diglib.eg.org/handle/10.2312/eurova20181113","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":null}],"best_oa_location":{"id":"doi:10.2312/eurova.20181113","is_oa":true,"landing_page_url":"https://doi.org/10.2312/eurova.20181113","pdf_url":null,"source":{"id":"https://openalex.org/S7407052899","display_name":"Eurographics","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W1926713316","https://openalex.org/W3203296232","https://openalex.org/W2948575709","https://openalex.org/W3037358932","https://openalex.org/W3118016452","https://openalex.org/W2020464294","https://openalex.org/W2965779895","https://openalex.org/W2005650977","https://openalex.org/W2802553466","https://openalex.org/W1971471810","https://openalex.org/W3042463260","https://openalex.org/W2127373329","https://openalex.org/W2947249479","https://openalex.org/W2167937298","https://openalex.org/W2965624617","https://openalex.org/W3095207572","https://openalex.org/W2153707161","https://openalex.org/W1968667271","https://openalex.org/W19238109","https://openalex.org/W1548555861"],"abstract_inverted_index":{"Understanding":[0],"network":[1,86,117],"activity":[2],"and":[3,14,20,68,89,102,114,129],"cyber":[4,37,49],"threats":[5],"is":[6,31],"of":[7,48,65,94],"major":[8],"concern":[9],"these":[10],"days,":[11],"for":[12,119],"business":[13],"private":[15],"users":[16],"alike.":[17],"As":[18],"more":[19,21],"online":[22],"applications":[23],"assist":[24],"us":[25],"in":[26,75,106,140],"our":[27,46,69,79,126],"daily":[28],"life,":[29],"there":[30],"a":[32,96],"growing":[33],"potential":[34],"vulnerability":[35],"to":[36,44,133],"crime.":[38],"With":[39,78],"this":[40,66,76,141],"paper,":[41],"we":[42],"want":[43],"share":[45],"vision":[47,67],"security":[50],"analytics":[51],"becoming":[52],"an":[53,111,131],"accessible":[54,113],"everyday":[55],"task":[56,97],"through":[57],"visual":[58,116],"analysis":[59],"tools.":[60],"We":[61,109],"describe":[62],"the":[63,72,107],"context":[64],"experience":[70],"with":[71],"first":[73,127],"achievements":[74],"direction.":[77],"new":[80],"prototype,":[81,128],"anyone":[82],"can":[83],"analyze":[84],"their":[85],"traffic":[87],"logs":[88],"get":[90],"security-relevant":[91],"information":[92],"out":[93],"it,":[95],"that":[98],"was":[99],"too":[100,104],"difficult":[101],"sometimes":[103],"expensive":[105],"past.":[108],"present":[110],"open,":[112],"user-friendly":[115],"analyzer":[118],"PCAP":[120],"(packet":[121],"capture)":[122],"files,":[123],"critically":[124],"discuss":[125],"give":[130],"outlook":[132],"anomaly":[134],"detection":[135],"supported":[136],"by":[137],"active":[138],"learning":[139],"context.":[142]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
