{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T12:04:22Z","timestamp":1742990662691,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030293802"},{"type":"electronic","value":"9783030293819"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-29381-9_31","type":"book-chapter","created":{"date-parts":[[2019,8,28]],"date-time":"2019-08-28T09:07:01Z","timestamp":1566983221000},"page":"497-518","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Comparative Evaluation of Node-Link and Sankey Diagrams for the Cyber Security Domain"],"prefix":"10.1007","author":[{"given":"Rotem","family":"Blinder","sequence":"first","affiliation":[]},{"given":"Ofer","family":"Biller","sequence":"additional","affiliation":[]},{"given":"Adir","family":"Even","sequence":"additional","affiliation":[]},{"given":"Oded","family":"Sofer","sequence":"additional","affiliation":[]},{"given":"Noam","family":"Tractinsky","sequence":"additional","affiliation":[]},{"given":"Joel","family":"Lanir","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Bak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,23]]},"reference":[{"issue":"1","key":"31_CR1","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1109\/TVCG.2015.2467322","volume":"22","author":"Y Albo","year":"2016","unstructured":"Albo, Y., Lanir, J., Bak, P., Rafaeli, S.: Off the radar: comparative evaluation of radial visualization solutions for composite indicators. IEEE Trans. Visual Comput. Graphics 22(1), 569\u2013578 (2016)","journal-title":"IEEE Trans. Visual Comput. Graphics"},{"key":"31_CR2","unstructured":"Amar, R., Eagan, J., Stasko, J.: Low-level components of analytic activity in information visualization. In: IEEE Symposium on Information Visualization, INFOVIS 2005, pp. 111\u2013117. IEEE (2005)"},{"issue":"6","key":"31_CR3","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1016\/S1045-926X(03)00046-6","volume":"14","author":"N Andrienko","year":"2003","unstructured":"Andrienko, N., Andrienko, G., Gatalsky, P.: Exploratory spatio-temporal visualization: an analytical review. J. Vis. Lang. Comput. 14(6), 503\u2013541 (2003)","journal-title":"J. Vis. Lang. Comput."},{"key":"31_CR4","doi-asserted-by":"crossref","unstructured":"Ball, R., Fink, G.A., North, C.: Home-centric visualization of network traffic for security administration. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, pp. 55\u201364. ACM (2004)","DOI":"10.1145\/1029208.1029217"},{"key":"31_CR5","doi-asserted-by":"crossref","unstructured":"Best, D.M., Endert, A., Kidwell, D.: 7 key challenges for visualization in cyber network defense. In: Proceedings of the Eleventh Workshop on Visualization for Cyber Security, pp. 33\u201340. ACM (2014)","DOI":"10.1145\/2671491.2671497"},{"key":"31_CR6","doi-asserted-by":"publisher","unstructured":"Best, D.M., Endert, A., Kidwell, D.: 7 key challenges for visualization in cyber network defense. In: Proceedings of the Eleventh Workshop on Visualization for Cyber Security, VizSec 2014, pp. 33\u201340. ACM, New York (2014). https:\/\/doi.org\/10.1145\/2671491.2671497","DOI":"10.1145\/2671491.2671497"},{"key":"31_CR7","doi-asserted-by":"crossref","unstructured":"Boyandin, I., Bertini, E., Lalanne, D.: A qualitative study on the exploration of temporal changes in flow maps with animation and small-multiples. In: Computer Graphics Forum, vol. 31, pp. 1005\u20131014. Wiley Online Library (2012)","DOI":"10.1111\/j.1467-8659.2012.03093.x"},{"key":"31_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-540-70956-5_2","volume-title":"Information Visualization","author":"S Carpendale","year":"2008","unstructured":"Carpendale, S.: Evaluating information visualizations. In: Kerren, A., Stasko, J.T., Fekete, J.-D., North, C. (eds.) Information Visualization. LNCS, vol. 4950, pp. 19\u201345. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-70956-5_2"},{"issue":"5","key":"31_CR9","doi-asserted-by":"publisher","first-page":"851","DOI":"10.1006\/ijhc.2000.0422","volume":"53","author":"C Chen","year":"2000","unstructured":"Chen, C., Yu, Y.: Empirical studies of information visualization: a meta-analysis. Int. J. Hum. Comput. Stud. 53(5), 851\u2013866 (2000)","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"31_CR10","doi-asserted-by":"crossref","unstructured":"Conati, C., Carenini, G., Toker, D., Lall\u00e9, S.: Towards user-adaptive information visualization. In: AAAI, pp. 4100\u20134106 (2015)","DOI":"10.1609\/aaai.v29i1.9775"},{"issue":"9","key":"31_CR11","doi-asserted-by":"publisher","first-page":"913","DOI":"10.1287\/mnsc.23.9.913","volume":"23","author":"GW Dickson","year":"1977","unstructured":"Dickson, G.W., Senn, J.A., Chervany, N.L.: Research in management information systems: the Minnesota experiments. Manage. Sci. 23(9), 913\u2013934 (1977)","journal-title":"Manage. Sci."},{"issue":"1","key":"31_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1287\/isre.1.1.1","volume":"1","author":"JJ Elam","year":"1990","unstructured":"Elam, J.J., Mead, M.: Can software influence creativity? Inf. Syst. Res. 1(1), 1\u201322 (1990)","journal-title":"Inf. Syst. Res."},{"key":"31_CR13","unstructured":"Ferebee, D., Dasgupta, D.: Security visualization survey. In: Proceedings of the 12th Colloquium for Information Systems Security Education University of Texas, p. 124. Citeseer (2008)"},{"key":"31_CR14","doi-asserted-by":"crossref","unstructured":"Fink, G.A., North, C.L., Endert, A., Rose, S.: Visualizing cyber security: usable workspaces. In: 6th International Workshop on Visualization for Cyber Security, VizSec 2009, pp. 45\u201356. IEEE (2009)","DOI":"10.1109\/VIZSEC.2009.5375542"},{"key":"31_CR15","doi-asserted-by":"publisher","unstructured":"Ghoniem, M., Fekete, J.D., Castagliola, P.: A comparison of the readability of graphs using node-link and matrix-based representations. In: IEEE Symposium on Information Visualization, pp. 17\u201324 (2004). https:\/\/doi.org\/10.1109\/INFVIS.2004.1","DOI":"10.1109\/INFVIS.2004.1"},{"key":"31_CR16","first-page":"299","volume":"98","author":"L Girardin","year":"1998","unstructured":"Girardin, L., Brodbeck, D.: A visual approach for monitoring logs. LISA 98, 299\u2013308 (1998)","journal-title":"LISA"},{"key":"31_CR17","doi-asserted-by":"publisher","first-page":"213","DOI":"10.2307\/249689","volume":"2","author":"DL Goodhue","year":"1995","unstructured":"Goodhue, D.L., Thompson, R.L.: Task-technology fit and individual performance. MIS Q. 2, 213\u2013236 (1995)","journal-title":"MIS Q."},{"key":"31_CR18","doi-asserted-by":"crossref","unstructured":"Hasco\u00ebt, M., Dragicevic, P.: Interactive graph matching and visual comparison of graphs and clustered graphs. In: Proceedings of the International Working Conference on Advanced Visual Interfaces, pp. 522\u2013529. ACM (2012)","DOI":"10.1145\/2254556.2254654"},{"key":"31_CR19","doi-asserted-by":"crossref","unstructured":"Heer, J., Card, S.K., Landay, J.A.: Prefuse: a toolkit for interactive information visualization. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 421\u2013430. ACM (2005)","DOI":"10.1145\/1054972.1055031"},{"issue":"1","key":"31_CR20","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/2945.841119","volume":"6","author":"I Herman","year":"2000","unstructured":"Herman, I., Melan\u00e7on, G., Marshall, M.S.: Graph visualization and navigation in information visualization: a survey. IEEE Trans. Visual Comput. Graphics 6(1), 24\u201343 (2000)","journal-title":"IEEE Trans. Visual Comput. Graphics"},{"key":"31_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/978-3-319-16462-5_18","volume-title":"Provenance and Annotation of Data and Processes","author":"R Hoekstra","year":"2015","unstructured":"Hoekstra, R., Groth, P.: PROV-O-Viz - understanding the role of activities in provenance. In: Lud\u00e4scher, B., Plale, B. (eds.) IPAW 2014. LNCS, vol. 8628, pp. 215\u2013220. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-16462-5_18"},{"key":"31_CR22","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1057\/ivs.2009.10","volume":"8","author":"W Huanga","year":"2009","unstructured":"Huanga, W.: Measuring effectiveness of graph visualizations: a cognitive load perspective. Inf. Vis. 8, 139\u2013152 (2009)","journal-title":"Inf. Vis."},{"issue":"5","key":"31_CR23","doi-asserted-by":"publisher","first-page":"1063","DOI":"10.1007\/s00778-007-0051-4","volume":"17","author":"A Kamra","year":"2008","unstructured":"Kamra, A., Terzi, E., Bertino, E.: Detecting anomalous access patterns in relational databases. VLDB J. Int. J. Very Large Data Bases 17(5), 1063\u20131077 (2008)","journal-title":"VLDB J. Int. J. Very Large Data Bases"},{"key":"31_CR24","doi-asserted-by":"publisher","first-page":"1520","DOI":"10.1109\/TVCG.2011.279","volume":"18","author":"H Lam","year":"2012","unstructured":"Lam, H., Bertini, E., Isenberg, P., Plaisant, C., Carpendale, M.S.T.: Empirical studies in information visualization: seven scenarios. IEEE Trans. Visual Comput. Graphics 18, 1520\u20131536 (2012)","journal-title":"IEEE Trans. Visual Comput. Graphics"},{"issue":"12","key":"31_CR25","doi-asserted-by":"publisher","first-page":"1373","DOI":"10.1007\/s00371-013-0892-3","volume":"30","author":"S Liu","year":"2014","unstructured":"Liu, S., Cui, W., Wu, Y., Liu, M.: A survey on information visualization: recent advances and challenges. Visual Comput. 30(12), 1373\u20131393 (2014)","journal-title":"Visual Comput."},{"key":"31_CR26","unstructured":"Ma, K.L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3\u20137. Australian Computer Society, Inc. (2006)"},{"key":"31_CR27","doi-asserted-by":"crossref","unstructured":"Perer, A., Wang, F.: Frequence: interactive mining and visualization of temporal frequent event sequences. In: Proceedings of the 19th International Conference on Intelligent User Interfaces, pp. 153\u2013162. ACM (2014)","DOI":"10.1145\/2557500.2557508"},{"key":"31_CR28","unstructured":"Riehmann, P., Hanfler, M., Froehlich, B.: Interactive Sankey diagrams. In: IEEE Symposium on Information Visualization, INFOVIS 2005, pp. 233\u2013240. IEEE (2005)"},{"issue":"1","key":"31_CR29","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1111\/j.1530-9290.2008.00004.x","volume":"12","author":"M Schmidt","year":"2008","unstructured":"Schmidt, M.: The Sankey diagram in energy and material flow management. J. Ind. Ecol. 12(1), 82\u201394 (2008)","journal-title":"J. Ind. Ecol."},{"issue":"8","key":"31_CR30","doi-asserted-by":"publisher","first-page":"1313","DOI":"10.1109\/TVCG.2011.144","volume":"18","author":"H Shiravi","year":"2012","unstructured":"Shiravi, H., Shiravi, A., Ghorbani, A.A.: A survey of visualization systems for network security. IEEE Trans. Visual Comput. Graphics 18(8), 1313\u20131329 (2012)","journal-title":"IEEE Trans. Visual Comput. Graphics"},{"key":"31_CR31","doi-asserted-by":"crossref","unstructured":"Staheli, D., et al.: Visualization evaluation for cyber security: trends and future directions. In: Proceedings of the Eleventh Workshop on Visualization for Cyber Security, pp. 49\u201356. ACM (2014)","DOI":"10.1145\/2671491.2671492"},{"key":"31_CR32","doi-asserted-by":"crossref","unstructured":"Toker, D., Conati, C., Steichen, B., Carenini, G.: Individual user characteristics and information visualization: connecting the dots through eye tracking. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 295\u2013304. ACM (2013)","DOI":"10.1145\/2470654.2470696"},{"key":"31_CR33","unstructured":"Tractinsky, N.: Visual aesthetics. In: The Encyclopedia of Human-Computer Interaction, 2nd edn. (2013)"},{"key":"31_CR34","unstructured":"Wagner, M., et al.: A survey of visualization systems for Malware analysis. In: EG Conference on Visualization (EuroVis)-STARs, pp. 105\u2013125 (2015)"},{"issue":"12","key":"31_CR35","doi-asserted-by":"publisher","first-page":"2659","DOI":"10.1109\/TVCG.2012.225","volume":"18","author":"K Wongsuphasawat","year":"2012","unstructured":"Wongsuphasawat, K., Gotz, D.: Exploring flow, factors, and outcomes of temporal event sequences with the outflow visualization. IEEE Trans. Visual Comput. Graphics 18(12), 2659\u20132668 (2012)","journal-title":"IEEE Trans. Visual Comput. Graphics"},{"key":"31_CR36","doi-asserted-by":"crossref","unstructured":"Yin, X., Yurcik, W., Treaster, M., Li, Y., Lakkaraju, K.: VisFlowConnect: NetFlow visualizations of link relationships for security situational awareness. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, pp. 26\u201334. ACM (2004)","DOI":"10.1145\/1029208.1029214"},{"key":"31_CR37","doi-asserted-by":"crossref","unstructured":"Zhao, J., Liu, Z., Dontcheva, M., Hertzmann, A., Wilson, A.: MatrixWave: visual comparison of event sequence data. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp. 259\u2013268. ACM (2015)","DOI":"10.1145\/2702123.2702419"}],"container-title":["Lecture Notes in Computer Science","Human-Computer Interaction \u2013 INTERACT 2019"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-29381-9_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,28]],"date-time":"2023-08-28T00:15:10Z","timestamp":1693181710000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-29381-9_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030293802","9783030293819"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-29381-9_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"23 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INTERACT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paphos","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cyprus","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"interact2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/interact2019.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"PCS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"385","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"111","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"55","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48 other papers were accepted.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}