Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries.
Gregory J. ContiJulian B. GrizzardMustaque AhamadHenry L. OwenPublished in: VizSEC (2005)
Keyphrases
- visual exploration
- visual data mining
- interactive visual
- visualization tool
- data objects
- scientific visualization
- website
- exploratory analysis
- retrieval systems
- database
- data mining
- query processing
- web search engines
- computer graphics
- user queries
- user interaction
- search queries
- data visualization
- xml documents
- user interface
- data streams
- computer vision
- search engine
- machine learning