All public logs
Jump to navigation
Jump to search
Combined display of all available logs of InfoVis:Wiki. You can narrow down the view by selecting a log type, the username (case-sensitive), or the affected page (also case-sensitive).
- 09:37, 21 February 2018 Arind talk contribs uploaded File:Docuburst-alice-animal-ui.png (DocuBurst software created by Christopher Collins currently maintained by Rafael Veras showing "Alice’s Adventures in Wonderland", by Lewis Carroll)
- 11:54, 2 August 2017 Arind talk contribs uploaded File:KnAVA Model.png (Conceptual Model of Knowledge-Assisted Visual Analytics. The model is divided into two spaces (machine and human) and describes knowledge generation, conversion, and exploitation within the visual analytics discourse, in terms of processes: analysis A...)
- 14:08, 24 March 2017 Arind talk contribs uploaded File:MalwareVisualizationTaxonomy with References.pdf (Categorization of malware visualization systems into three categories, namely (1) Individual Malware Analysis, (2) Malware Comparison, and (3) Malware Summarization. All systems have the ultimate goal to generate rules and signatures for fully-automate...)
- 14:07, 24 March 2017 Arind talk contribs uploaded File:MalwareVisualizationTaxonomy without Text.png (Categorization of malware visualization systems into three categories, namely (1) Individual Malware Analysis, (2) Malware Comparison, and (3) Malware Summarization. All systems have the ultimate goal to generate rules and signatures for fully-automate...)
- 14:06, 24 March 2017 Arind talk contribs uploaded File:MalwareVisualizationTaxonomy without Text.pdf (Categorization of malware visualization systems into three categories, namely (1) Individual Malware Analysis, (2) Malware Comparison, and (3) Malware Summarization. All systems have the ultimate goal to generate rules and signatures for fully-automate...)
- 13:44, 24 March 2017 Arind talk contribs uploaded File:Malware VisualizationTaxonomy with References.png (Categorization of malware visualization systems into three categories, namely (1) Individual Malware Analysis, (2) Malware Comparison, and (3) Malware Summarization. All systems have the ultimate goal to generate rules and signatures for fully-automate...)