Academic literature on the topic 'Visualization for computer security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Visualization for computer security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Visualization for computer security"
Ma, Kwan-Liu. "Visualization for security." ACM SIGGRAPH Computer Graphics 38, no. 4 (2004): 4–6. http://dx.doi.org/10.1145/1039140.1039146.
Full textYuan, Xiaohong, Percy Vega, Yaseen Qadah, Ricky Archer, Huiming Yu, and Jinsheng Xu. "Visualization Tools for Teaching Computer Security." ACM Transactions on Computing Education 9, no. 4 (2010): 1–28. http://dx.doi.org/10.1145/1656255.1656258.
Full textZhang, Yanping, Yang Xiao, Min Chen, Jingyuan Zhang, and Hongmei Deng. "A survey of security visualization for computer network logs." Security and Communication Networks 5, no. 4 (2011): 404–21. http://dx.doi.org/10.1002/sec.324.
Full textBarrera, David, and Paul C. van Oorschot. "Accommodating IPv6 Addresses in Security Visualization Tools." Information Visualization 10, no. 2 (2010): 107–16. http://dx.doi.org/10.1057/ivs.2010.9.
Full textLobachev, Oleg. "Direct visualization of cryptographic keys for enhanced security." Visual Computer 34, no. 12 (2017): 1749–59. http://dx.doi.org/10.1007/s00371-017-1466-6.
Full textConti, G., K. Abdullah, J. Grizzard, et al. "Countering security information overload through alert and packet visualization." IEEE Computer Graphics and Applications 26, no. 2 (2006): 60–70. http://dx.doi.org/10.1109/mcg.2006.30.
Full textTri Dang, Tran, and Tran Khanh Dang. "Visualization of web form submissions for security analysis." International Journal of Web Information Systems 9, no. 2 (2013): 165–80. http://dx.doi.org/10.1108/ijwis-12-2012-0036.
Full textGoodall, John R. "An Evaluation of Visual and Textual Network Analysis Tools." Information Visualization 10, no. 2 (2011): 145–57. http://dx.doi.org/10.1057/ivs.2011.2.
Full textJin Liu, Jing Sun, Zheng Q. Xu, and Lu Gao. "Security Web Release and Visualization of Remote Sensing Images." International Journal of Digital Content Technology and its Applications 4, no. 3 (2010): 146–53. http://dx.doi.org/10.4156/jdcta.vol4.issue3.15.
Full textNovikova, Evgenia Sergeevna, and Igor Vitalievich Kotenko. "Analysis of the Visualization Techniques used for Information Security in the Computer Networks." SPIIRAS Proceedings 4, no. 23 (2014): 7. http://dx.doi.org/10.15622/sp.23.1.
Full textDissertations / Theses on the topic "Visualization for computer security"
Teoh, Soon Tee. "Interactive visualization techniques for computer network security /." For electronic version search Digital dissertations database. Restricted to UC campuses. Access is free to UC campus dissertations, 2004. http://uclibs.org/PID/11984.
Full textWhitaker, Robert Bruce. "Applying Information Visualization to Computer Security Applications." DigitalCommons@USU, 2010. https://digitalcommons.usu.edu/etd/636.
Full textLuse, Andrew William. "Exploring utilization of visualization for computer and network security." [Ames, Iowa : Iowa State University], 2009.
Find full textAbdullah, Kulsoom B. "Scaling and Visualizing Network Data to Facilitate in Intrusion Detection Tasks." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/10509.
Full textNunnally, Troy J. "Advanced visualizations for network security." Diss., Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/52993.
Full textFreet, David Nathan. "A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency." Thesis, Indiana State University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10261868.
Full textKasemsri, Rawiroj Robert. "A Survey, Taxonomy, and Analysis of Network Security Visualization Techniques." Digital Archive @ GSU, 2006. http://digitalarchive.gsu.edu/cs_theses/17.
Full textShirazi, Patrick. "Identifying Challenges in Cybersecurity Data Visualization Dashboards." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-80412.
Full textMusa, Shahrulniza. "Visualising network security attacks with multiple 3D visualisation and false alert classification." Thesis, Loughborough University, 2008. https://dspace.lboro.ac.uk/2134/14241.
Full textWang, Hsiu-Chung. "Toward a Heuristic Model for Evaluating the Complexity of Computer Security Visualization Interface." Digital Archive @ GSU, 2006. http://digitalarchive.gsu.edu/cs_theses/35.
Full textBooks on the topic "Visualization for computer security"
Goodall, John R., Gregory Conti, and Kwan-Liu Ma, eds. Visualization for Computer Security. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-85933-8.
Full textInternational Workshop on Visualization for Cyber Security. 6th International Workshop on Visualization for Cyber Security 2009: Atlantic City, New Jersey, USA, October 11, 2009 : proceedings. IEEE, 2009.
Find full textDavid, Hutchison. Visualization for Computer Security: 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings. Springer-Verlag Berlin Heidelberg, 2008.
Find full textAssociation for Computing Machinery. Special Interest Group on Security, Audit, and Control. and ACM Conference on Computer and Communications Security (11th : 2004 : Washington, D.C.), eds. VizSEC/DMSEC '04: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, Washington, DC, USA, October 29, 2004, co-located with CCS 2004. ACM, 2004.
Find full textBuford, John F. Koegel. Cyber security, situation management, and impact assessment II and visual analytics for homeland defense and security II: 5 and 8-9 April 2010, Orlando, Florida, United States. SPIE, 2010.
Find full textKim, Moon S. Defense and security 2008: Special sessions on food safety, visual analytics, resource restricted embedded and sensor networks, and 3D imaging and display : 17-18 March 2008, Orlando, Florida, USA. Edited by Society of Photo-optical Instrumentation Engineers. SPIE, 2008.
Find full textBook chapters on the topic "Visualization for computer security"
Minarik, Pavel, and Tomas Dymacek. "NetFlow Data Visualization Based on Graphs." In Visualization for Computer Security. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-85933-8_14.
Full textJankun-Kelly, T. J., Josh Franck, David Wilson, Jeffery Carver, David Dampier, and J. Edward Swan. "Show Me How You See: Lessons from Studying Computer Forensics Experts for Visualization." In Visualization for Computer Security. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-85933-8_8.
Full textNovikova, Evgenia, Mikhail Bestuzhev, and Igor Kotenko. "Anomaly Detection in the HVAC System Operation by a RadViz Based Visualization-Driven Approach." In Computer Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42048-2_26.
Full textde Camargo, Luiz F., Alessandro Moraes, Diego R. C. Dias, and José R. F. Brega. "Information Visualization Applied to Computer Network Security." In Computational Science and Its Applications – ICCSA 2020. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58802-1_4.
Full textKolomeec, Maxim, Gustavo Gonzalez-Granadillo, Elena Doynikova, Andrey Chechulin, Igor Kotenko, and Hervé Debar. "Choosing Models for Security Metrics Visualization." In Lecture Notes in Computer Science. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-65127-9_7.
Full textIshihara, Manabu, and Taiki Kanayama. "Visualization of Network Security Data by Haptic." In Lecture Notes in Computer Science. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-91467-1_7.
Full textHawthorne, Glen, Ying He, Leandros Maglaras, and Helge Janicke. "Security Visualization: Detecting Denial of Service." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52569-3_4.
Full textJin, Wenkui, Xurong Shan, and Ke Ma. "Research on Information Visualization Design for Public Health Security Emergencies." In Lecture Notes in Computer Science. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78468-3_22.
Full textHanauer, Tanja, and Wolfgang Hommel. "Enhancing Enterprise IT Security with a Visualization-Based Process Framework." In Communications in Computer and Information Science. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-4825-3_18.
Full textChen, Jie, and Yan Huang. "In Internet-Based Visualization System Study about Breakthrough Applet Security Restrictions." In Computer and Computing Technologies in Agriculture III. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12220-0_57.
Full textConference papers on the topic "Visualization for computer security"
Beaver, Justin M., Chad A. Steed, Robert M. Patton, Xiaohui Cui, and Matthew Schultz. "Visualization techniques for computer network defense." In SPIE Defense, Security, and Sensing, edited by Edward M. Carapezza. SPIE, 2011. http://dx.doi.org/10.1117/12.883487.
Full textAlsaleh, Mansour, David Barrera, and P. C. van Oorschot. "Improving Security Visualization with Exposure Map Filtering." In 2008 Annual Computer Security Applications Conference (ACSAC). IEEE, 2008. http://dx.doi.org/10.1109/acsac.2008.16.
Full text"IEEE Workshop on Visualization for Computer Security 2005 (VizSEC 05)." In IEEE Workshop on Visualization for Computer Security, 2005. (VizSEC 05). IEEE, 2005. http://dx.doi.org/10.1109/vizsec.2005.1532059.
Full textYang, Tingting, and Shuwen Jia. "Research on Network Security Visualization under Big Data Environment." In 2016 International Computer Symposium (ICS). IEEE, 2016. http://dx.doi.org/10.1109/ics.2016.0135.
Full textCarr, Steve, and Jean Mayo. "SecureCvisual: Visualization and Analysis for C Code Security." In SIGCSE '20: The 51st ACM Technical Symposium on Computer Science Education. ACM, 2020. http://dx.doi.org/10.1145/3328778.3372540.
Full textYermalovich, Pavel. "Dashboard Visualization Techniques in Information Security." In 2020 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2020. http://dx.doi.org/10.1109/isncc49221.2020.9297291.
Full textZhongyang Kan, Changzhen Hu, Zhigang Wang, Guoqiang Wang, and Xiaolong Huang. "NetVis: A network security management visualization tool based on treemap." In 2010 2nd International Conference on Advanced Computer Control. IEEE, 2010. http://dx.doi.org/10.1109/icacc.2010.5487236.
Full textChaisorn, Lekha, Corey Manders, Janya Sainui, and Tian Shiang Kok. "Visualization and Security for Video Sharing and Transfer over Networks." In 2010 Second International Conference on Computer Modeling and Simulation (ICCMS). IEEE, 2010. http://dx.doi.org/10.1109/iccms.2010.497.
Full textAlmjawel, Aljoharah, Sahar Bayoumi, Dalal Alshehri, Soroor Alzahrani, and Munirah Alotaibi. "Sentiment Analysis and Visualization of Amazon Books' Reviews." In 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS). IEEE, 2019. http://dx.doi.org/10.1109/cais.2019.8769589.
Full text"A Visualization Method Based on Graph Database in Security Logs Analysis." In 2017 6th International Conference on Advanced Materials and Computer Science. Clausius Scientific Press Inc., 2017. http://dx.doi.org/10.23977/icamcs.2017.1012.
Full textReports on the topic "Visualization for computer security"
Swanson, Marianne, and Elizabeth B. Lennon. Computer security:. National Institute of Standards and Technology, 1991. http://dx.doi.org/10.6028/nist.ir.4545.
Full textSECRETARY OF THE AIR FORCE WASHINGTON DC. Computer Security Assistance Program. Defense Technical Information Center, 1997. http://dx.doi.org/10.21236/ada404996.
Full textTodd, Mary Anne, and Constance Guitian. Computer security training guidelines. National Institute of Standards and Technology, 1989. http://dx.doi.org/10.6028/nist.sp.500-172.
Full textBerg, Michael J. Indirection and computer security. Office of Scientific and Technical Information (OSTI), 2011. http://dx.doi.org/10.2172/1034885.
Full textFaculjak, D. A. Implementing security measures for computer-based security systems. Office of Scientific and Technical Information (OSTI), 1989. http://dx.doi.org/10.2172/6137987.
Full textSECRETARY OF THE AIR FORCE WASHINGTON DC. Communications and Information: Computer Security. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada405011.
Full textBergendahl, T. J., K. S. Smith, and J. G. Sullivan. Computer Security Products Technology Overview. Defense Technical Information Center, 1988. http://dx.doi.org/10.21236/ada203261.
Full textGuttman, Barbara, and Edward Roback. An introduction to computer security :. National Institute of Standards and Technology, 1995. http://dx.doi.org/10.6028/nist.sp.800-12.
Full textSkandera, Mark, and Marianne Swanson. Computer security bulletin board system:. National Institute of Standards and Technology, 1991. http://dx.doi.org/10.6028/nist.ir.4667.
Full textSkandera, Mark, and Marianne Swanson. Computer security bulletin board system:. National Institute of Standards and Technology, 1992. http://dx.doi.org/10.6028/nist.ir.4933.
Full text