Academic literature on the topic 'Visualization for computer security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Visualization for computer security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Visualization for computer security"

1

Ma, Kwan-Liu. "Visualization for security." ACM SIGGRAPH Computer Graphics 38, no. 4 (2004): 4–6. http://dx.doi.org/10.1145/1039140.1039146.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yuan, Xiaohong, Percy Vega, Yaseen Qadah, Ricky Archer, Huiming Yu, and Jinsheng Xu. "Visualization Tools for Teaching Computer Security." ACM Transactions on Computing Education 9, no. 4 (2010): 1–28. http://dx.doi.org/10.1145/1656255.1656258.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Yanping, Yang Xiao, Min Chen, Jingyuan Zhang, and Hongmei Deng. "A survey of security visualization for computer network logs." Security and Communication Networks 5, no. 4 (2011): 404–21. http://dx.doi.org/10.1002/sec.324.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Barrera, David, and Paul C. van Oorschot. "Accommodating IPv6 Addresses in Security Visualization Tools." Information Visualization 10, no. 2 (2010): 107–16. http://dx.doi.org/10.1057/ivs.2010.9.

Full text
Abstract:
Visualization is used by security analysts to help detect patterns and trends in large volumes of network traffic data. With IPv6 slowly being deployed around the world, network intruders are beginning to adapt their tools and techniques to work over IPv6 (versus IPv4). Many tools for visualizing network activity, while useful for detecting large-scale attacks and network behavior anomalies, still only support IPv4. In this article, we explore the current state of IPv6 support in some popular security visualization tools and identify the roadblocks preventing those tools from supporting the ne
APA, Harvard, Vancouver, ISO, and other styles
5

Lobachev, Oleg. "Direct visualization of cryptographic keys for enhanced security." Visual Computer 34, no. 12 (2017): 1749–59. http://dx.doi.org/10.1007/s00371-017-1466-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Conti, G., K. Abdullah, J. Grizzard, et al. "Countering security information overload through alert and packet visualization." IEEE Computer Graphics and Applications 26, no. 2 (2006): 60–70. http://dx.doi.org/10.1109/mcg.2006.30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tri Dang, Tran, and Tran Khanh Dang. "Visualization of web form submissions for security analysis." International Journal of Web Information Systems 9, no. 2 (2013): 165–80. http://dx.doi.org/10.1108/ijwis-12-2012-0036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Goodall, John R. "An Evaluation of Visual and Textual Network Analysis Tools." Information Visualization 10, no. 2 (2011): 145–57. http://dx.doi.org/10.1057/ivs.2011.2.

Full text
Abstract:
User testing is an integral component of user-centered design, but has only rarely been applied to visualization for cyber security applications. This article presents the results of a comparative evaluation between a visualization-based application and a more traditional, table-based application for analyzing computer network packet captures. We conducted this evaluation as part of the user-centered design process. Participants performed both structured, well-defined tasks and exploratory, open-ended tasks with both tools. We measured accuracy and efficiency for the well-defined tasks, number
APA, Harvard, Vancouver, ISO, and other styles
9

Jin Liu, Jing Sun, Zheng Q. Xu, and Lu Gao. "Security Web Release and Visualization of Remote Sensing Images." International Journal of Digital Content Technology and its Applications 4, no. 3 (2010): 146–53. http://dx.doi.org/10.4156/jdcta.vol4.issue3.15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Novikova, Evgenia Sergeevna, and Igor Vitalievich Kotenko. "Analysis of the Visualization Techniques used for Information Security in the Computer Networks." SPIIRAS Proceedings 4, no. 23 (2014): 7. http://dx.doi.org/10.15622/sp.23.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Visualization for computer security"

1

Teoh, Soon Tee. "Interactive visualization techniques for computer network security /." For electronic version search Digital dissertations database. Restricted to UC campuses. Access is free to UC campus dissertations, 2004. http://uclibs.org/PID/11984.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Whitaker, Robert Bruce. "Applying Information Visualization to Computer Security Applications." DigitalCommons@USU, 2010. https://digitalcommons.usu.edu/etd/636.

Full text
Abstract:
This thesis presents two phases of research in applying visualization to network security challenges. The first phase included discovering the most useful and powerful features in existing computer security visualizations and incorporating them into the AdviseAid visualization platform, an existing software package. The incorporation of such a complete feature set required novel resolution of software engineering, human factors, and computer graphics issues. We also designed additional novel features, such as plugin interfaces, allowing for rapid prototyping and experimentation with novel v
APA, Harvard, Vancouver, ISO, and other styles
3

Luse, Andrew William. "Exploring utilization of visualization for computer and network security." [Ames, Iowa : Iowa State University], 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Abdullah, Kulsoom B. "Scaling and Visualizing Network Data to Facilitate in Intrusion Detection Tasks." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/10509.

Full text
Abstract:
As the trend of successful network attacks continue to rise, better forms of intrusion, detection and prevention are needed. This thesis addresses network traffic visualization techniques that aid administrators in recognizing attacks. A view of port statistics and Intrusion Detection System (IDS) alerts has been developed. Each help to address issues with analyzing large datasets involving networks. Due to the amount of traffic as well as the range of possible port numbers and IP addresses, scaling techniques are necessary. A port-based overview of network activity produces an improved r
APA, Harvard, Vancouver, ISO, and other styles
5

Nunnally, Troy J. "Advanced visualizations for network security." Diss., Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/52993.

Full text
Abstract:
Monitoring volumes of malicious network data for across multiple sources can potentially be overwhelming. As a result, vital data is at a greater risk of being overlooked and the time span for analyzing it could be too lengthy. One way to address this issue is to employ network security visualization techniques to evaluate security risks and identify malicious activity to help mitigate compromised nodes on a network. The purpose of this thesis is to introduce a visualization framework to help reduce task-completion time, enhance situational awareness, and decrease user error of complex visua
APA, Harvard, Vancouver, ISO, and other styles
6

Freet, David Nathan. "A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency." Thesis, Indiana State University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10261868.

Full text
Abstract:
<p> The flood of raw data generated by intrusion detection and other network monitoring devices can be so overwhelming that it causes great difficulty in detecting patterns that might indicate malicious traffic. In order to more effectively monitor and process network and forensic data within a virtualized environment, Security Visualization (SecViz) provides software-based visual interfaces to analyze live and logged network data within the domains of network security, network and cloud forensics, attack prevention, compliance management, wireless security, secure coding, and penetration test
APA, Harvard, Vancouver, ISO, and other styles
7

Kasemsri, Rawiroj Robert. "A Survey, Taxonomy, and Analysis of Network Security Visualization Techniques." Digital Archive @ GSU, 2006. http://digitalarchive.gsu.edu/cs_theses/17.

Full text
Abstract:
Network security visualization is a relatively new field and is quickly gaining momentum. Network security visualization allows the display and projection of the network or system data, in hope to efficiently monitor and protect the system from any intrusions or possible attacks. Intrusions and attacks are constantly continuing to increase in number, size, and complexity. Textually reading through log files or other textual sources is currently insufficient to secure a network or system. Using graphical visualization, security information is presented visually, and not only by text. Without ne
APA, Harvard, Vancouver, ISO, and other styles
8

Shirazi, Patrick. "Identifying Challenges in Cybersecurity Data Visualization Dashboards." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-80412.

Full text
Abstract:
Nowadays, a massive amount of cybersecurity data-objects, such as security events, logs,messages, are flowing through different cybersecurity systems. With the enormous fastdevelopment of different cloud environments, big data, IoT, and so on, these amounts of data areincreasingly revolutionary. One of the challenges for different security actors, such as securityadmins, cybersecurity analysis, and network technicians, is how to utilize this amount of data inorder to reach meaningful insights, so they can be used further in diagnosis, validation, forensicand decision-making purposes. In order
APA, Harvard, Vancouver, ISO, and other styles
9

Musa, Shahrulniza. "Visualising network security attacks with multiple 3D visualisation and false alert classification." Thesis, Loughborough University, 2008. https://dspace.lboro.ac.uk/2134/14241.

Full text
Abstract:
Increasing numbers of alerts produced by network intrusion detection systems (NIDS) have burdened the job of security analysts especially in identifying and responding to them. The tasks of exploring and analysing large quantities of communication network security data are also difficult. This thesis studied the application of visualisation in combination with alerts classifier to make the exploring and understanding of network security alerts data faster and easier. The prototype software, NSAViz, has been developed to visualise and to provide an intuitive presentation of the network security
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Hsiu-Chung. "Toward a Heuristic Model for Evaluating the Complexity of Computer Security Visualization Interface." Digital Archive @ GSU, 2006. http://digitalarchive.gsu.edu/cs_theses/35.

Full text
Abstract:
Computer security visualization has gained much attention in the research community in the past few years. However, the advancement in security visualization research has been hampered by the lack of standardization in visualization design, centralized datasets, and evaluation methods. We propose a new heuristic model for evaluating the complexity of computer security visualizations. This complexity evaluation method is designed to evaluate the efficiency of performing visual search in security visualizations in terms of measuring critical memory capacity load needed to perform such tasks. Our
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Visualization for computer security"

1

Goodall, John R., Gregory Conti, and Kwan-Liu Ma, eds. Visualization for Computer Security. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-85933-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Marty, Raffael. Applied security visualization. Addison-Wesley, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Applied security visualization. Addison-Wesley, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Security data visualization. No Starch Press, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

International Workshop on Visualization for Cyber Security. 6th International Workshop on Visualization for Cyber Security 2009: Atlantic City, New Jersey, USA, October 11, 2009 : proceedings. IEEE, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

David, Hutchison. Visualization for Computer Security: 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings. Springer-Verlag Berlin Heidelberg, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Association for Computing Machinery. Special Interest Group on Security, Audit, and Control. and ACM Conference on Computer and Communications Security (11th : 2004 : Washington, D.C.), eds. VizSEC/DMSEC '04: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, Washington, DC, USA, October 29, 2004, co-located with CCS 2004. ACM, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Buford, John F. Koegel. Cyber security, situation management, and impact assessment II and visual analytics for homeland defense and security II: 5 and 8-9 April 2010, Orlando, Florida, United States. SPIE, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kim, Moon S. Defense and security 2008: Special sessions on food safety, visual analytics, resource restricted embedded and sensor networks, and 3D imaging and display : 17-18 March 2008, Orlando, Florida, USA. Edited by Society of Photo-optical Instrumentation Engineers. SPIE, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hagen, Hans. Focus on Scientific Visualization. Springer Berlin Heidelberg, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Visualization for computer security"

1

Minarik, Pavel, and Tomas Dymacek. "NetFlow Data Visualization Based on Graphs." In Visualization for Computer Security. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-85933-8_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jankun-Kelly, T. J., Josh Franck, David Wilson, Jeffery Carver, David Dampier, and J. Edward Swan. "Show Me How You See: Lessons from Studying Computer Forensics Experts for Visualization." In Visualization for Computer Security. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-85933-8_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Novikova, Evgenia, Mikhail Bestuzhev, and Igor Kotenko. "Anomaly Detection in the HVAC System Operation by a RadViz Based Visualization-Driven Approach." In Computer Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42048-2_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

de Camargo, Luiz F., Alessandro Moraes, Diego R. C. Dias, and José R. F. Brega. "Information Visualization Applied to Computer Network Security." In Computational Science and Its Applications – ICCSA 2020. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58802-1_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kolomeec, Maxim, Gustavo Gonzalez-Granadillo, Elena Doynikova, Andrey Chechulin, Igor Kotenko, and Hervé Debar. "Choosing Models for Security Metrics Visualization." In Lecture Notes in Computer Science. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-65127-9_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ishihara, Manabu, and Taiki Kanayama. "Visualization of Network Security Data by Haptic." In Lecture Notes in Computer Science. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-91467-1_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hawthorne, Glen, Ying He, Leandros Maglaras, and Helge Janicke. "Security Visualization: Detecting Denial of Service." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52569-3_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jin, Wenkui, Xurong Shan, and Ke Ma. "Research on Information Visualization Design for Public Health Security Emergencies." In Lecture Notes in Computer Science. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78468-3_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hanauer, Tanja, and Wolfgang Hommel. "Enhancing Enterprise IT Security with a Visualization-Based Process Framework." In Communications in Computer and Information Science. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-4825-3_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chen, Jie, and Yan Huang. "In Internet-Based Visualization System Study about Breakthrough Applet Security Restrictions." In Computer and Computing Technologies in Agriculture III. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12220-0_57.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Visualization for computer security"

1

Beaver, Justin M., Chad A. Steed, Robert M. Patton, Xiaohui Cui, and Matthew Schultz. "Visualization techniques for computer network defense." In SPIE Defense, Security, and Sensing, edited by Edward M. Carapezza. SPIE, 2011. http://dx.doi.org/10.1117/12.883487.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Alsaleh, Mansour, David Barrera, and P. C. van Oorschot. "Improving Security Visualization with Exposure Map Filtering." In 2008 Annual Computer Security Applications Conference (ACSAC). IEEE, 2008. http://dx.doi.org/10.1109/acsac.2008.16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

"IEEE Workshop on Visualization for Computer Security 2005 (VizSEC 05)." In IEEE Workshop on Visualization for Computer Security, 2005. (VizSEC 05). IEEE, 2005. http://dx.doi.org/10.1109/vizsec.2005.1532059.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yang, Tingting, and Shuwen Jia. "Research on Network Security Visualization under Big Data Environment." In 2016 International Computer Symposium (ICS). IEEE, 2016. http://dx.doi.org/10.1109/ics.2016.0135.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Carr, Steve, and Jean Mayo. "SecureCvisual: Visualization and Analysis for C Code Security." In SIGCSE '20: The 51st ACM Technical Symposium on Computer Science Education. ACM, 2020. http://dx.doi.org/10.1145/3328778.3372540.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yermalovich, Pavel. "Dashboard Visualization Techniques in Information Security." In 2020 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2020. http://dx.doi.org/10.1109/isncc49221.2020.9297291.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zhongyang Kan, Changzhen Hu, Zhigang Wang, Guoqiang Wang, and Xiaolong Huang. "NetVis: A network security management visualization tool based on treemap." In 2010 2nd International Conference on Advanced Computer Control. IEEE, 2010. http://dx.doi.org/10.1109/icacc.2010.5487236.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chaisorn, Lekha, Corey Manders, Janya Sainui, and Tian Shiang Kok. "Visualization and Security for Video Sharing and Transfer over Networks." In 2010 Second International Conference on Computer Modeling and Simulation (ICCMS). IEEE, 2010. http://dx.doi.org/10.1109/iccms.2010.497.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Almjawel, Aljoharah, Sahar Bayoumi, Dalal Alshehri, Soroor Alzahrani, and Munirah Alotaibi. "Sentiment Analysis and Visualization of Amazon Books' Reviews." In 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS). IEEE, 2019. http://dx.doi.org/10.1109/cais.2019.8769589.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

"A Visualization Method Based on Graph Database in Security Logs Analysis." In 2017 6th International Conference on Advanced Materials and Computer Science. Clausius Scientific Press Inc., 2017. http://dx.doi.org/10.23977/icamcs.2017.1012.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Visualization for computer security"

1

Swanson, Marianne, and Elizabeth B. Lennon. Computer security:. National Institute of Standards and Technology, 1991. http://dx.doi.org/10.6028/nist.ir.4545.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

SECRETARY OF THE AIR FORCE WASHINGTON DC. Computer Security Assistance Program. Defense Technical Information Center, 1997. http://dx.doi.org/10.21236/ada404996.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Todd, Mary Anne, and Constance Guitian. Computer security training guidelines. National Institute of Standards and Technology, 1989. http://dx.doi.org/10.6028/nist.sp.500-172.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Berg, Michael J. Indirection and computer security. Office of Scientific and Technical Information (OSTI), 2011. http://dx.doi.org/10.2172/1034885.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Faculjak, D. A. Implementing security measures for computer-based security systems. Office of Scientific and Technical Information (OSTI), 1989. http://dx.doi.org/10.2172/6137987.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

SECRETARY OF THE AIR FORCE WASHINGTON DC. Communications and Information: Computer Security. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada405011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bergendahl, T. J., K. S. Smith, and J. G. Sullivan. Computer Security Products Technology Overview. Defense Technical Information Center, 1988. http://dx.doi.org/10.21236/ada203261.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Guttman, Barbara, and Edward Roback. An introduction to computer security :. National Institute of Standards and Technology, 1995. http://dx.doi.org/10.6028/nist.sp.800-12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Skandera, Mark, and Marianne Swanson. Computer security bulletin board system:. National Institute of Standards and Technology, 1991. http://dx.doi.org/10.6028/nist.ir.4667.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Skandera, Mark, and Marianne Swanson. Computer security bulletin board system:. National Institute of Standards and Technology, 1992. http://dx.doi.org/10.6028/nist.ir.4933.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!