<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://infovis-wiki.net/w/index.php?action=history&amp;feed=atom&amp;title=File%3AMalwareVisualizationTaxonomy_without_Text.png</id>
	<title>File:MalwareVisualizationTaxonomy without Text.png - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://infovis-wiki.net/w/index.php?action=history&amp;feed=atom&amp;title=File%3AMalwareVisualizationTaxonomy_without_Text.png"/>
	<link rel="alternate" type="text/html" href="https://infovis-wiki.net/w/index.php?title=File:MalwareVisualizationTaxonomy_without_Text.png&amp;action=history"/>
	<updated>2026-05-11T09:32:31Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.3</generator>
	<entry>
		<id>https://infovis-wiki.net/w/index.php?title=File:MalwareVisualizationTaxonomy_without_Text.png&amp;diff=159654&amp;oldid=prev</id>
		<title>Arind: Categorization of malware visualization systems into three categories, namely (1) Individual Malware Analysis, (2) Malware Comparison, and (3) Malware Summarization. All systems have the ultimate goal to generate rules and signatures for fully-automate...</title>
		<link rel="alternate" type="text/html" href="https://infovis-wiki.net/w/index.php?title=File:MalwareVisualizationTaxonomy_without_Text.png&amp;diff=159654&amp;oldid=prev"/>
		<updated>2017-03-24T13:07:30Z</updated>

		<summary type="html">&lt;p&gt;Categorization of malware visualization systems into three categories, namely (1) Individual Malware Analysis, (2) Malware Comparison, and (3) Malware Summarization. All systems have the ultimate goal to generate rules and signatures for fully-automate...&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;== Summary ==&lt;br /&gt;
Categorization of malware visualization systems into three categories, namely (1) Individual Malware Analysis, (2) Malware Comparison, and (3) Malware Summarization. All systems have the ultimate goal to generate rules and signatures for fully-automated malware detection systems. While the first category tackles the problem of understanding the behavior of an individual malware sample for forensics, the latter two focus on the identification of common behavior for malware classification.&lt;br /&gt;
== Copyright status: ==&lt;br /&gt;
This file is licensed under the [http://creativecommons.org/licenses/by/4.0/ Creative Commons Attribution 4.0 International] license.&lt;br /&gt;
== Source: ==&lt;br /&gt;
Redrawn by the authors based on Wagner, M.; Fischer, F.; Luh, R.; Haberson, A.; Rind, A.; Keim, D. A. &amp;amp; Aigner, W.: [[A Survey of Visualization Systems for Malware Analysis]], Borgo, R.; Ganovelli, F. &amp;amp; Viola, I. (eds.), Proceedings of Eurographics Conference on Visualization (EuroVis) State of The Art Reports, p. 105-125, Cagliari, Italy, Eurographics, 2015. doi:10.2312/eurovisstar.20151114&lt;/div&gt;</summary>
		<author><name>Arind</name></author>
	</entry>
</feed>