{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T10:24:30Z","timestamp":1750501470929,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,10]],"date-time":"2014-11-10T00:00:00Z","timestamp":1415577600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004956","name":"Bundesministerium f\u00fcr Verkehr, Innovation und Technologie","doi-asserted-by":"publisher","award":["836264"],"award-info":[{"award-number":["836264"]}],"id":[{"id":"10.13039\/501100004956","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002428","name":"Austrian Science Fund","doi-asserted-by":"publisher","award":["P25489"],"award-info":[{"award-number":["P25489"]}],"id":[{"id":"10.13039\/501100002428","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,10]]},"DOI":"10.1145\/2671491.2671498","type":"proceedings-article","created":{"date-parts":[[2014,12,8]],"date-time":"2014-12-08T16:30:28Z","timestamp":1418056228000},"page":"9-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Problem characterization and abstraction for visual analytics in behavior-based malware pattern analysis"],"prefix":"10.1145","author":[{"given":"Markus","family":"Wagner","sequence":"first","affiliation":[{"name":"St. P\u00f6lten Univ. of Applied Sciences, Austria"}]},{"given":"Wolfgang","family":"Aigner","sequence":"additional","affiliation":[{"name":"St. P\u00f6lten Univ. of Applied Sciences, Austria"}]},{"given":"Alexander","family":"Rind","sequence":"additional","affiliation":[{"name":"St. P\u00f6lten Univ. of Applied Sciences, Austria"}]},{"given":"Hermann","family":"Dornhackl","sequence":"additional","affiliation":[{"name":"St. P\u00f6lten Univ. of Applied Sciences, Austria"}]},{"given":"Konstantin","family":"Kadletz","sequence":"additional","affiliation":[{"name":"St. P\u00f6lten Univ. of Applied Sciences, Austria"}]},{"given":"Robert","family":"Luh","sequence":"additional","affiliation":[{"name":"St. P\u00f6lten Univ. of Applied Sciences, Austria"}]},{"given":"Paul","family":"Tavolato","sequence":"additional","affiliation":[{"name":"St. P\u00f6lten Univ. of Applied Sciences, Austria"}]}],"member":"320","published-online":{"date-parts":[[2014,11,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-85729-079-3"},{"key":"e_1_3_2_1_2_1","volume-title":"15th Ann. Conf. Europ. Inst. Computer Antivirus Research, EICAR","author":"Bayer U.","year":"2006","unstructured":"U. Bayer , C. Kruegel , and E. Kirda . TTAnalyze: A tool for analyzing malware . In 15th Ann. Conf. Europ. Inst. Computer Antivirus Research, EICAR , 2006 . U. Bayer, C. Kruegel, and E. Kirda. TTAnalyze: A tool for analyzing malware. In 15th Ann. Conf. Europ. Inst. Computer Antivirus Research, EICAR, 2006."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/IKT.2013.6620049"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2013.124"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1342211.1342215"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/VAST.2009.5333443"},{"key":"e_1_3_2_1_7_1","volume-title":"No Starch Press","author":"Conti G.","year":"2007","unstructured":"G. Conti . Security data visualization: graphical techniques for network analysis . No Starch Press , 2007 . G. Conti. Security data visualization: graphical techniques for network analysis. No Starch Press, 2007."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2014.52"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2089125.2089126"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2009.5375542"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/GHTCE.2013.6767242"},{"key":"e_1_3_2_1_12_1","first-page":"1421","volume-title":"Proc. of the 10th Americas Conf. on Info. Systems","author":"Goodall J. R.","year":"2004","unstructured":"J. R. Goodall , A. Komlodi , and W. G. Lutters . The work of intrusion detection: Rethinking the role of security analysts . In Proc. of the 10th Americas Conf. on Info. Systems , pages 1421 -- 1427 , NY, 2004 . J. R. Goodall, A. Komlodi, and W. G. Lutters. The work of intrusion detection: Rethinking the role of security analysts. In Proc. of the 10th Americas Conf. on Info. Systems, pages 1421--1427, NY, 2004."},{"key":"e_1_3_2_1_13_1","volume-title":"AMIA Annual Symp. Proceedings","author":"Gotz D.","year":"2012","unstructured":"D. Gotz , H. Stavropoulos , J. Sun , and F. Wang . ICDA: A platform for intelligent care delivery analytics . AMIA Annual Symp. Proceedings , 2012: 264--273, 2012 . D. Gotz, H. Stavropoulos, J. Sun, and F. Wang. ICDA: A platform for intelligent care delivery analytics. AMIA Annual Symp. Proceedings, 2012:264--273, 2012."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/2945.841121"},{"key":"e_1_3_2_1_15_1","volume-title":"Eurographics","author":"Keim D.","year":"2010","unstructured":"D. Keim , J. Kohlhammer , G. Ellis , and F. Mansmann , editors. Mastering the information age: solving problems with visual analytics . Eurographics , 2010 . D. Keim, J. Kohlhammer, G. Ellis, and F. Mansmann, editors. Mastering the information age: solving problems with visual analytics. Eurographics, 2010."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06793-3"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2011.279"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02719780"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1841406"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICISA.2011.5772330"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2009.167"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cag.2013.11.002"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2009.111"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1622776.1622780"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2009.5375539"},{"key":"e_1_3_2_1_26_1","volume-title":"Workshop on Beyond the Laboratory: Supporting Authentic Collaboration with Multiple Displays","author":"Sedlmair M.","year":"2008","unstructured":"M. Sedlmair , D. Baur , S. Boring , P. Isenberg , M. Jurmu , and A. Butz . Requirements for a MDE system to support collaborative in-car communication diagnostics . In Workshop on Beyond the Laboratory: Supporting Authentic Collaboration with Multiple Displays , 2008 . M. Sedlmair, D. Baur, S. Boring, P. Isenberg, M. Jurmu, and A. Butz. Requirements for a MDE system to support collaborative in-car communication diagnostics. In Workshop on Beyond the Laboratory: Supporting Authentic Collaboration with Multiple Displays, 2008."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2012.255"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2012.213"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179576.1179580"},{"key":"e_1_3_2_1_30_1","volume-title":"Interaction Design: Beyond Human-Computer Interaction","author":"Sharp H.","year":"2007","unstructured":"H. Sharp , Y. Rogers , and J. Preece . Interaction Design: Beyond Human-Computer Interaction . John Wiley & Sons , 2 nd edition, 2007 . H. Sharp, Y. Rogers, and J. Preece. Interaction Design: Beyond Human-Computer Interaction. John Wiley & Sons, 2nd edition, 2007.","edition":"2"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2011.144"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/832277.834354"},{"key":"e_1_3_2_1_33_1","volume-title":"NIST","author":"Stoneburner G.","year":"2002","unstructured":"G. Stoneburner , A. Y. Goguen , and A. Feringa . SP 800-30. risk management guide for information technology systems. Technical report , NIST , 2002 . G. Stoneburner, A. Y. Goguen, and A. Feringa. SP 800-30. risk management guide for information technology systems. Technical report, NIST, 2002."},{"key":"e_1_3_2_1_34_1","volume-title":"Illuminating the path: The research and development agenda for visual analytics","author":"Thomas J. J.","year":"2005","unstructured":"J. J. Thomas and K. A. Cook . Illuminating the path: The research and development agenda for visual analytics . IEEE Comp. Society Press , 2005 . J. J. Thomas and K. A. Cook. Illuminating the path: The research and development agenda for visual analytics. IEEE Comp. Society Press, 2005."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1377966.1377975"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2009.5375540"},{"key":"e_1_3_2_1_37_1","first-page":"110","volume-title":"Proc. IEEE Symp. Information Visualization (InfoVis)","author":"Wattenberg M.","year":"2002","unstructured":"M. Wattenberg . Arc diagrams : Visualizing structure in strings . In Proc. IEEE Symp. Information Visualization (InfoVis) , pages 110 -- 116 , 2002 . M. Wattenberg. Arc diagrams: Visualizing structure in strings. In Proc. IEEE Symp. Information Visualization (InfoVis), pages 110--116, 2002."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2008.172"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1080\/01449290410001673036"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.45"},{"key":"e_1_3_2_1_41_1","volume-title":"IEEE VisWeek Workshop on Visual Analytics in Healthcare","author":"Wongsuphasawat K.","year":"2011","unstructured":"K. Wongsuphasawat and D. Gotz . Outflow: Visualizing patient flow by symptoms and outcome . In IEEE VisWeek Workshop on Visual Analytics in Healthcare , Providence, Rhode Island, USA , 2011 . K. Wongsuphasawat and D. Gotz. Outflow: Visualizing patient flow by symptoms and outcome. In IEEE VisWeek Workshop on Visual Analytics in Healthcare, Providence, Rhode Island, USA, 2011."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85933-8_3"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2005.21"},{"key":"e_1_3_2_1_44_1","first-page":"765","volume-title":"Asia-Pacific Conf. on Communications","author":"Yee C. L.","year":"2012","unstructured":"C. L. Yee , L. L. Chuan , M. Ismail , and N. Zainal . A static and dynamic visual debugger for malware analysis . In Asia-Pacific Conf. on Communications , pages 765 -- 769 , 2012 . C. L. Yee, L. L. Chuan, M. Ismail, and N. Zainal. A static and dynamic visual debugger for malware analysis. In Asia-Pacific Conf. on Communications, pages 765--769, 2012."}],"event":{"name":"VizSec '14: Visualization for Cyber Security","acronym":"VizSec '14","location":"Paris France"},"container-title":["Proceedings of the Eleventh Workshop on Visualization for Cyber Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2671491.2671498","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2671491.2671498","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:17:03Z","timestamp":1750227423000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2671491.2671498"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,10]]},"references-count":44,"alternative-id":["10.1145\/2671491.2671498","10.1145\/2671491"],"URL":"https:\/\/doi.org\/10.1145\/2671491.2671498","relation":{},"subject":[],"published":{"date-parts":[[2014,11,10]]},"assertion":[{"value":"2014-11-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}