cybersec incidents
1
Introduction
1.1
Research topic
1.2
Data availability
1.3
Motivation
2
Proposal
2.1
Research topic
2.2
Data availability
2.3
Motivation
3
Data
3.1
Sources
3.2
Cleaning / transformation
3.2.1
Incident Extraction
3.2.2
NLP Feature Prediction
3.3
Missing value analysis
4
Results
4.1
Temporal Analysis of Cybersecurity Incidents
4.2
Hacker and Victim Analysis
4.3
Type of Cyber Attack
4.4
Targeted Industries
5
Interactive component
5.1
Attack Origin Bar Plot
5.2
Victim Origin Bar Plot
5.3
Geospatial Attacker Origin Plot Top 5
5.4
Geospatial Victim Origin Plot Top 5
5.5
Future Work
6
Conclusion
6.1
Summary
6.2
Limitations
Published with bookdown
Visualization of Cybersecurity Incidents
Chapter 5
Interactive component
5.1
Attack Origin Bar Plot
5.2
Victim Origin Bar Plot
5.3
Geospatial Attacker Origin Plot Top 5
5.4
Geospatial Victim Origin Plot Top 5
5.5
Future Work
Features to include in future:
button to vary number of countries displayed
button to change color scale
sliding scale to change number of bars in bar plot