<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns:community="http://www.bibsonomy.org/ontologies/2008/05/community#" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:owl="http://www.w3.org/2002/07/owl#" xmlns:admin="http://webns.net/mvcb/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" xmlns:cc="http://web.resource.org/cc/" xmlns:xsd="http://www.w3.org/2001/XMLSchema#" xmlns:swrc="http://swrc.ontoware.org/ontology#" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns="http://purl.org/rss/1.0/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xml:base="https://puma.ub.uni-stuttgart.de/tag/VisualAnalytics"><owl:Ontology rdf:about=""><rdfs:comment>PUMA publications for /tag/VisualAnalytics</rdfs:comment><owl:imports rdf:resource="http://swrc.ontoware.org/ontology/portal"/></owl:Ontology><rdf:Description rdf:about="https://puma.ub.uni-stuttgart.de/bibtex/27c962cd5283e3aa070839ed649f69ee8/franziskabecker"><owl:sameAs rdf:resource="/uri/bibtex/27c962cd5283e3aa070839ed649f69ee8/franziskabecker"/><rdf:type rdf:resource="http://swrc.ontoware.org/ontology#Misc"/><swrc:date>Mon Mar 18 16:37:00 CET 2024</swrc:date><swrc:booktitle>1st Japan Visualization Symposium (JapanVis 2024)</swrc:booktitle><swrc:title>AlertSets: Supporting Exploratory Analysis of Cybersecurity Alerts through Sets</swrc:title><swrc:year>2024</swrc:year><swrc:keywords>DesignStudy VisualAnalytics cybersecurity sets visualization visus:beckerfa visus:ertl visus:mueller </swrc:keywords><swrc:abstract>Security providers typically deal with large numbers of alerts based on heterogeneous data from many endpoint sensors. While the number of alerts is generally much smaller than the volume of raw data, most alerts are false positives that do not reflect genuinely malicious activity. All types of experts work on such alerts, be it to determine whether they are indeed false positives, to build machine learning models to support their analysis or to keep an eye on the current threat landscape. We conducted a design study to support a diverse group of experts whose working environments are connected to the same alert data. Based on an ongoing industry project that clusters vectorized alerts, we designed and evaluated a visual analytics system enabling exploration via powerful, easy-to-understand filtering mechanisms framed through set operations. In this article, we describe our system, give a detailed breakdown of the design process and the lessons we learned. Lastly, we discuss the results from expert interviews, which showed the set-based framing to align with experts’ intuitive approach to data analysis and helped users uncover improvement opportunities for the clustering pipeline.</swrc:abstract><swrc:hasExtraField><swrc:Field swrc:value="en" swrc:key="language"/></swrc:hasExtraField><swrc:author><rdf:Seq><rdf:_1><swrc:Person swrc:name="Franziska Becker"/></rdf:_1><rdf:_2><swrc:Person swrc:name="Christoph Müller"/></rdf:_2><rdf:_3><swrc:Person swrc:name="David Karpuk"/></rdf:_3><rdf:_4><swrc:Person swrc:name="Thomas Ertl"/></rdf:_4></rdf:Seq></swrc:author></rdf:Description><rdf:Description rdf:about="https://puma.ub.uni-stuttgart.de/bibtex/2d3a38735db22151ef086631ae78d5cd4/franziskabecker"><owl:sameAs rdf:resource="/uri/bibtex/2d3a38735db22151ef086631ae78d5cd4/franziskabecker"/><rdf:type rdf:resource="http://swrc.ontoware.org/ontology#InProceedings"/><owl:sameAs rdf:resource="https://ieeexplore.ieee.org/document/9347410"/><swrc:date>Mon Mar 18 10:53:07 CET 2024</swrc:date><swrc:booktitle>2020 IEEE Symposium on Visualization for Cyber Security (VizSec)</swrc:booktitle><swrc:month>oct</swrc:month><swrc:pages>25-29</swrc:pages><swrc:publisher><swrc:Organization swrc:name="IEEE"/></swrc:publisher><swrc:title>Interpretable Visualizations of Deep Neural Networks for Domain Generation Algorithm Detection</swrc:title><swrc:year>2020</swrc:year><swrc:keywords>Cybersecurity DomainGenerationAlgorithms VisualAnalytics Visualization vis4ai visus:beckerfa visus:ertl visus:mueller </swrc:keywords><swrc:abstract>Due to their success in many application areas, deep learning models have found wide adoption for many problems. However, their black-box nature makes it hard to trust their decisions and to evaluate their line of reasoning. In the field of cybersecurity, this lack of trust and understanding poses a significant challenge for the utilization of deep learning models. Thus, we present a visual analytics system that provides designers of deep learning models for the classification of domain generation algorithms with understandable interpretations of their model. We cluster the activations of the model&#039;s nodes and leverage decision trees to explain these clusters. In combination with a 2D projection, the user can explore how the model views the data at different layers. In a preliminary evaluation of our system, we show how it can be employed to better understand misclassifications, identify potential biases and reason about the role different layers in a model may play.</swrc:abstract><swrc:hasExtraField><swrc:Field swrc:value="en" swrc:key="language"/></swrc:hasExtraField><swrc:hasExtraField><swrc:Field swrc:value="2639-4332" swrc:key="issn"/></swrc:hasExtraField><swrc:hasExtraField><swrc:Field swrc:value="10.1109/VizSec51108.2020.00010" swrc:key="doi"/></swrc:hasExtraField><swrc:author><rdf:Seq><rdf:_1><swrc:Person swrc:name="Franziska Becker"/></rdf:_1><rdf:_2><swrc:Person swrc:name="Arthur Drichel"/></rdf:_2><rdf:_3><swrc:Person swrc:name="Christoph Müller"/></rdf:_3><rdf:_4><swrc:Person swrc:name="Thomas Ertl"/></rdf:_4></rdf:Seq></swrc:author></rdf:Description><foaf:Group rdf:about="https://puma.ub.uni-stuttgart.de/tag/VisualAnalytics"><foaf:name>VisualAnalytics</foaf:name><description>Community for tag(s) VisualAnalytics</description></foaf:Group></rdf:RDF>