Chen Zhong
Cited by
Cited by
A cyber security data triage operation retrieval system
C Zhong, T Lin, P Liu, J Yen, K Chen
Computers & Security 76, 12-31, 2018
Retrieval of relevant historical data triage operations in security operation centers
T Lin, C Zhong, J Yen, P Liu
From Database to Cyber Security, 227-243, 2018
Automate Cybersecurity Data Triage by Leveraging Human Analysts' Cognitive Process
C Zhong, J Yen, P Liu, RF Erbacher
2016 IEEE 2nd International Conference on Big Data Security on Cloud …, 2016
An integrated computer-aided cognitive task analysis method for tracing cyber-attack analysis processes
C Zhong, J Yen, P Liu, R Erbacher, R Etoty, C Garneau
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 1-11, 2015
Studying analysts’ data triage operations in cyber defense situational analysis
C Zhong, J Yen, P Liu, RF Erbacher, C Garneau, B Chen
Theory and models for cyber situation awareness, 128-169, 2017
ARSCA: a computer tool for tracing the cognitive processes of cyber-attack analysis
C Zhong, J Yen, P Liu, R Erbacher, R Etoty, C Garneau
2015 IEEE International Multi-Disciplinary Conference on Cognitive Methods …, 2015
RankAOH: Context-driven similarity-based retrieval of experiences in cyber analysis
C Zhong, D Samuel, J Yen, P Liu, R Erbacher, S Hutchinson, R Etoty, ...
2014 IEEE International Inter-Disciplinary Conference on Cognitive Methods …, 2014
Learning from experts’ experience: toward automated cyber security data triage
C Zhong, J Yen, P Liu, RF Erbacher
IEEE Systems Journal 13 (1), 603-614, 2018
Cognitive process
J Yen, RF Erbacher, C Zhong, P Liu
Cyber Defense and Situational Awareness, 119-144, 2014
How to use experience in cyber analysis: An analytical reasoning support system
C Zhong, DS Kirubakaran, J Yen, P Liu, S Hutchinson, H Cam
2013 IEEE International Conference on Intelligence and Security Informatics …, 2013
Context-aware multimodal recommendations of multimedia data in cyber situational awareness
A Alnusair, C Zhong, M Rawashdeh, MS Hossain, A Alamri
Multimedia Tools and Applications 76 (21), 22823-22843, 2017
Cybersecurity Education: From beginners to advanced players in cybersecurity competitions
LJ Thomas, M Balders, Z Countney, C Zhong, J Yao, C Xu
2019 IEEE International Conference on Intelligence and Security Informatics …, 2019
Federating geovisual analytic tools for cyber security analysis
M Zhao, C Zhong, R Ciamaichelo, M Konek, N Sawant, NA Giacobe
2012 IEEE Conference on Visual Analytics Science and Technology (VAST), 303-304, 2012
Can cyber operations be made autonomous? an answer from the situational awareness viewpoint
C Zhong, J Yen, P Liu
Adaptive Autonomous Secure Cyber Systems, 63-88, 2020
AOH-map: A mind mapping system for supporting collaborative cyber security analysis
C Zhong, A Alnusair, B Sayger, A Troxell, J Yao
2019 IEEE Conference on Cognitive and Computational Aspects of Situation …, 2019
Supporting collaboration among cyber security analysts through visualizing their analytical reasoning processes
L Thomas, A Vaughan, Z Courtney, C Zhong, A Alnusair
2018 IEEE International Conference on Multimedia & Expo Workshops (ICMEW), 1-6, 2018
Leveraging decision making in cyber security analysis through data cleaning
C Zhong, H Liu, A Alnusair
Southwestern Business Administration Journal 16 (1), 1, 2017
A cognitive process tracing approach to cybersecurity data triage operations automation
C Zhong
The Pennsylvania State University, 2016
Towards Agile Cyber Analysis: Leveraging Visualization as Functions in Collaborative Visual Analytics
C Zhong, M Zhao, G Xiao, J Xu
Proceedings of IEEE Symposium on Visual Analytics Science and Technology, 2013
FAIXID: A Framework for Enhancing AI Explainability of Intrusion Detection Results Using Data Cleaning Techniques
H Liu, C Zhong, A Alnusair, SR Islam
Journal of Network and Systems Management 29 (4), 1-30, 2021
The system can't perform the operation now. Try again later.
Articles 1–20