Journal articles on the topic 'Visualization Computer security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Visualization Computer security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Ma, Kwan-Liu. "Visualization for security." ACM SIGGRAPH Computer Graphics 38, no. 4 (November 2004): 4–6. http://dx.doi.org/10.1145/1039140.1039146.
Full textYuan, Xiaohong, Percy Vega, Yaseen Qadah, Ricky Archer, Huiming Yu, and Jinsheng Xu. "Visualization Tools for Teaching Computer Security." ACM Transactions on Computing Education 9, no. 4 (January 2010): 1–28. http://dx.doi.org/10.1145/1656255.1656258.
Full textZhang, Yanping, Yang Xiao, Min Chen, Jingyuan Zhang, and Hongmei Deng. "A survey of security visualization for computer network logs." Security and Communication Networks 5, no. 4 (May 11, 2011): 404–21. http://dx.doi.org/10.1002/sec.324.
Full textBarrera, David, and Paul C. van Oorschot. "Accommodating IPv6 Addresses in Security Visualization Tools." Information Visualization 10, no. 2 (November 11, 2010): 107–16. http://dx.doi.org/10.1057/ivs.2010.9.
Full textLobachev, Oleg. "Direct visualization of cryptographic keys for enhanced security." Visual Computer 34, no. 12 (December 27, 2017): 1749–59. http://dx.doi.org/10.1007/s00371-017-1466-6.
Full textConti, G., K. Abdullah, J. Grizzard, J. Stasko, J. A. Copeland, M. Ahamad, H. L. Owen, and C. Lee. "Countering security information overload through alert and packet visualization." IEEE Computer Graphics and Applications 26, no. 2 (March 2006): 60–70. http://dx.doi.org/10.1109/mcg.2006.30.
Full textTri Dang, Tran, and Tran Khanh Dang. "Visualization of web form submissions for security analysis." International Journal of Web Information Systems 9, no. 2 (June 14, 2013): 165–80. http://dx.doi.org/10.1108/ijwis-12-2012-0036.
Full textGoodall, John R. "An Evaluation of Visual and Textual Network Analysis Tools." Information Visualization 10, no. 2 (April 2011): 145–57. http://dx.doi.org/10.1057/ivs.2011.2.
Full textJin Liu, Jing Sun, Zheng Q. Xu, and Lu Gao. "Security Web Release and Visualization of Remote Sensing Images." International Journal of Digital Content Technology and its Applications 4, no. 3 (June 30, 2010): 146–53. http://dx.doi.org/10.4156/jdcta.vol4.issue3.15.
Full textNovikova, Evgenia Sergeevna, and Igor Vitalievich Kotenko. "Analysis of the Visualization Techniques used for Information Security in the Computer Networks." SPIIRAS Proceedings 4, no. 23 (March 17, 2014): 7. http://dx.doi.org/10.15622/sp.23.1.
Full textKhanh Dang, Tran, and Tran Tri Dang. "A survey on security visualization techniques for web information systems." International Journal of Web Information Systems 9, no. 1 (March 29, 2013): 6–31. http://dx.doi.org/10.1108/17440081311316361.
Full textXu, Ya Ning. "Research on Process Control of Human Resource Management Based on Visualization Technology." Applied Mechanics and Materials 687-691 (November 2014): 2258–62. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2258.
Full textОдиноков, С. Б., В. В. Колючкин, Д. В. Кузьмин, В. Е. Талалаев, П. А. Ханевич, А. В. Смирнов, and Л. И. Смирнов. "Метод персонализации фотополимерных защитных голограмм на основе записи скрытых кодированных цифровых изображений." Оптика и спектроскопия 129, no. 4 (2021): 393. http://dx.doi.org/10.21883/os.2021.04.50765.299-20.
Full textYu, Xiaoying, and Qi Liao. "User password repetitive patterns analysis and visualization." Information & Computer Security 24, no. 1 (March 14, 2016): 93–115. http://dx.doi.org/10.1108/ics-06-2015-0026.
Full textSonmez, Ferda Ozdemir, and Banu Gunel Kilic. "Holistic Web Application Security Visualization for Multi-Project and Multi-Phase Dynamic Application Security Test Results." IEEE Access 9 (2021): 25858–84. http://dx.doi.org/10.1109/access.2021.3057044.
Full textChang, Juan, Jian Hua Zhang, Dian Ji Zhang, and Zhi Gang Liu. "Research on Computer Information System of Disaster Warning Based on ANSYS and MATLAB." Applied Mechanics and Materials 484-485 (January 2014): 958–62. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.958.
Full textBai, Bing, Xue Jun Chen, En Qiang Zhu, Wan Xiao Xue, and Jie Yu. "Digital Urban Three-Dimensional Technique Base on OpenGL." Advanced Materials Research 726-731 (August 2013): 4568–71. http://dx.doi.org/10.4028/www.scientific.net/amr.726-731.4568.
Full textJang, Sejun, Shuyu Li, and Yunsick Sung. "FastText-Based Local Feature Visualization Algorithm for Merged Image-Based Malware Classification Framework for Cyber Security and Cyber Defense." Mathematics 8, no. 3 (March 24, 2020): 460. http://dx.doi.org/10.3390/math8030460.
Full textWu, Lili, Ganesh K. Venayagamoorthy, and Jinfeng Gao. "Online Steady-State Security Awareness Using Cellular Computation Networks and Fuzzy Techniques." Energies 14, no. 1 (December 30, 2020): 148. http://dx.doi.org/10.3390/en14010148.
Full textFu Lu, Liang, Jia Wan Zhang, Mao Lin Huang, and Lei Fu. "A new concentric-circle visualization of multi-dimensional data and its application in network security." Journal of Visual Languages & Computing 21, no. 4 (August 2010): 194–208. http://dx.doi.org/10.1016/j.jvlc.2010.05.002.
Full textDilla, William, Diane J. Janvrin, and Robyn Raschke. "Interactive Data Visualization: New Directions for Accounting Information Systems Research." Journal of Information Systems 24, no. 2 (September 1, 2010): 1–37. http://dx.doi.org/10.2308/jis.2010.24.2.1.
Full textBenito-Santos, Alejandro, and Roberto Therón Sánchez. "Defragmenting Research Areas with Knowledge Visualization and Visual Text Analytics." Applied Sciences 10, no. 20 (October 16, 2020): 7248. http://dx.doi.org/10.3390/app10207248.
Full textAbid, Adnan, Ansar Abbas, Adel Khelifi, Muhammad Shoaib Farooq, Razi Iqbal, and Uzma Farooq. "An architectural framework for information integration using machine learning approaches for smart city security profiling." International Journal of Distributed Sensor Networks 16, no. 10 (October 2020): 155014772096547. http://dx.doi.org/10.1177/1550147720965473.
Full textLiu, Zhaoli, Xiaohong Guan, Shancang Li, Tao Qin, and Chao He. "Behavior Rhythm: A New Model for Behavior Visualization and Its Application in System Security Management." IEEE Access 6 (2018): 73940–51. http://dx.doi.org/10.1109/access.2018.2882812.
Full textMeng, Linhao, Yating Wei, Rusheng Pan, Shuyue Zhou, Jianwei Zhang, and Wei Chen. "VADAF: Visualization for Abnormal Client Detection and Analysis in Federated Learning." ACM Transactions on Interactive Intelligent Systems 11, no. 3-4 (December 31, 2021): 1–23. http://dx.doi.org/10.1145/3426866.
Full textde Paula, Rogério, Xianghua Ding, Paul Dourish, Kari Nies, Ben Pillet, David F. Redmiles, Jie Ren, Jennifer A. Rode, and Roberto Silva Filho. "In the eye of the beholder: A visualization-based approach to information system security." International Journal of Human-Computer Studies 63, no. 1-2 (July 2005): 5–24. http://dx.doi.org/10.1016/j.ijhcs.2005.04.021.
Full textGolubev, Alexandr, Peter Bogatencov, and Grigore Secrieru. "DICOM data processing optimization in medical information systems." Scalable Computing: Practice and Experience 19, no. 2 (May 10, 2018): 189–201. http://dx.doi.org/10.12694/scpe.v19i2.1399.
Full textNovikova, Evgenia, Igor Kotenko, and Ivan Murenin. "The Visual Analytics Approach for Analyzing Trajectories of Critical Infrastructure Employers." Energies 13, no. 15 (August 1, 2020): 3936. http://dx.doi.org/10.3390/en13153936.
Full textSi, Nianwen, Wenlin Zhang, Dan Qu, Xiangyang Luo, Heyu Chang, and Tong Niu. "Spatial-Channel Attention-Based Class Activation Mapping for Interpreting CNN-Based Image Classification Models." Security and Communication Networks 2021 (May 31, 2021): 1–13. http://dx.doi.org/10.1155/2021/6682293.
Full textWang, Weichao, and Aidong Lu. "Interactive Wormhole Detection and Evaluation." Information Visualization 6, no. 1 (January 25, 2007): 3–17. http://dx.doi.org/10.1057/palgrave.ivs.9500144.
Full textFigueiredo, Ciro, and Caroline Mota. "Learning Preferences in a Spatial Multiple Criteria Decision Approach: An Application in Public Security Planning." International Journal of Information Technology & Decision Making 18, no. 04 (July 2019): 1403–32. http://dx.doi.org/10.1142/s0219622019500251.
Full textBaciu, George, Chenhui Li, Yunzhe Wang, and Xiujun Zhang. "Cloudet." International Journal of Cognitive Informatics and Natural Intelligence 10, no. 1 (January 2016): 12–31. http://dx.doi.org/10.4018/ijcini.2016010102.
Full textHingant, Javier, Marcelo Zambrano, Francisco J. Pérez, Israel Pérez, and Manuel Esteve. "HYBINT: A Hybrid Intelligence System for Critical Infrastructures Protection." Security and Communication Networks 2018 (August 27, 2018): 1–13. http://dx.doi.org/10.1155/2018/5625860.
Full textFan, Youping, Xin Li, and Peng Zhang. "Integrated Approach for Online Dynamic Security Assessment With Credibility and Visualization Based on Exploring Connotative Associations in Massive Data." IEEE Access 5 (2017): 16555–67. http://dx.doi.org/10.1109/access.2017.2739818.
Full textKagawa, Takuhiro, Sachio Saiki, and Masahide Nakamura. "Analyzing street crimes in Kobe city using PRISM." International Journal of Web Information Systems 15, no. 2 (June 17, 2019): 183–200. http://dx.doi.org/10.1108/ijwis-04-2018-0032.
Full textOssio, Raul, O. Isaac Garcia-Salinas, Diego Said Anaya-Mancilla, Jair S. Garcia-Sotelo, Luis A. Aguilar, David J. Adams, and Carla Daniela Robles-Espinoza. "VCF/Plotein: visualization and prioritization of genomic variants from human exome sequencing projects." Bioinformatics 35, no. 22 (June 4, 2019): 4803–5. http://dx.doi.org/10.1093/bioinformatics/btz458.
Full textDihl, Leandro, Leandro Cruz, and Nuno Gonçalves. "Card3DFace—An Application to Enhance 3D Visual Validation in ID Cards and Travel Documents." Applied Sciences 11, no. 19 (September 23, 2021): 8821. http://dx.doi.org/10.3390/app11198821.
Full textWanner, Franz, Wolfgang Jentner, Tobias Schreck, Andreas Stoffel, Lyubka Sharalieva, and Daniel A. Keim. "Integrated visual analysis of patterns in time series and text data - Workflow and application to financial data analysis." Information Visualization 15, no. 1 (April 1, 2015): 75–90. http://dx.doi.org/10.1177/1473871615576925.
Full textRobertson, George, David Ebert, Stephen Eick, Daniel Keim, and Ken Joy. "Scale and Complexity in Visual Analytics." Information Visualization 8, no. 4 (January 2009): 247–53. http://dx.doi.org/10.1057/ivs.2009.23.
Full textObagbuwa, Ibidun Christiana, and Ademola P. Abidoye. "South Africa Crime Visualization, Trends Analysis, and Prediction Using Machine Learning Linear Regression Technique." Applied Computational Intelligence and Soft Computing 2021 (June 8, 2021): 1–14. http://dx.doi.org/10.1155/2021/5537902.
Full textCook, Kristin, Georges Grinstein, and Mark Whiting. "The VAST Challenge: history, scope, and outcomes: An introduction to the Special Issue." Information Visualization 13, no. 4 (July 12, 2013): 301–12. http://dx.doi.org/10.1177/1473871613490678.
Full textHuang, Ruhua, Chunying Wang, Xiaoyu Zhang, Dan Wu, and Qingwen Xie. "Design, develop and evaluate an open government data platform: a user-centred approach." Electronic Library 37, no. 3 (June 3, 2019): 550–62. http://dx.doi.org/10.1108/el-02-2019-0037.
Full textSchweitzer, Dino, Jeff Boleng, Colin Hughes, and Louis Murphy. "Visualizing Keyboard Pattern Passwords." Information Visualization 10, no. 2 (November 18, 2010): 127–33. http://dx.doi.org/10.1057/ivs.2010.12.
Full textLakhno, Valeriy, Volodimir Malyukov, Berik Akhmetov, Dmytro Kasatkin, and Liubov Plyska. "Development of a model for choosing strategies for investing in information security." Eastern-European Journal of Enterprise Technologies 2, no. 3 (110) (April 30, 2021): 43–51. http://dx.doi.org/10.15587/1729-4061.2021.228313.
Full textKwon, Hyun, Hyunsoo Yoon, and Ki-Woong Park. "Selective Poisoning Attack on Deep Neural Networks †." Symmetry 11, no. 7 (July 8, 2019): 892. http://dx.doi.org/10.3390/sym11070892.
Full textHan, Zhike, Xiuchao Wu, Meng Chi, Jun Tang, and Lijing Yang. "A Novel Approach to Transform Bitmap to Vector Image for Data Reliable Visualization considering the Image Triangulation and Color Selection." Security and Communication Networks 2020 (November 2, 2020): 1–13. http://dx.doi.org/10.1155/2020/8871588.
Full textBabu, MVS, KNS Suman, and P. Srinivasa Rao. "Drafting software as a practicing tool for engineering drawing-based courses: Content planning to its evaluation in client–server environment." International Journal of Mechanical Engineering Education 47, no. 2 (January 25, 2018): 118–34. http://dx.doi.org/10.1177/0306419017754226.
Full textApostolakis, Konstantinos C., Nikolaos Dimitriou, George Margetis, Stavroula Ntoa, Dimitrios Tzovaras, and Constantine Stephanidis. "DARLENE – Improving situational awareness of European law enforcement agents through a combination of augmented reality and artificial intelligence solutions." Open Research Europe 1 (July 30, 2021): 87. http://dx.doi.org/10.12688/openreseurope.13715.1.
Full textLin, Hui, Pei Liu, Wei Li, Lian Peng Zhang, and Ya Zhou Ji. "Construction of Digital Mine and Key Technologies." Advanced Materials Research 524-527 (May 2012): 413–20. http://dx.doi.org/10.4028/www.scientific.net/amr.524-527.413.
Full text., Himanshi, Trisha Gulati, and Yasha Hasija. "Biometrics in Healthcare." INTERNATIONAL JOURNAL OF ADVANCED PRODUCTION AND INDUSTRIAL ENGINEERING 3, no. 2 (April 15, 2018): 13–17. http://dx.doi.org/10.35121/ijapie201804223.
Full text