To see the other types of publications on this topic, follow the link: Visualization for computer security.

Journal articles on the topic 'Visualization for computer security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Visualization for computer security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Ma, Kwan-Liu. "Visualization for security." ACM SIGGRAPH Computer Graphics 38, no. 4 (2004): 4–6. http://dx.doi.org/10.1145/1039140.1039146.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yuan, Xiaohong, Percy Vega, Yaseen Qadah, Ricky Archer, Huiming Yu, and Jinsheng Xu. "Visualization Tools for Teaching Computer Security." ACM Transactions on Computing Education 9, no. 4 (2010): 1–28. http://dx.doi.org/10.1145/1656255.1656258.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Yanping, Yang Xiao, Min Chen, Jingyuan Zhang, and Hongmei Deng. "A survey of security visualization for computer network logs." Security and Communication Networks 5, no. 4 (2011): 404–21. http://dx.doi.org/10.1002/sec.324.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Barrera, David, and Paul C. van Oorschot. "Accommodating IPv6 Addresses in Security Visualization Tools." Information Visualization 10, no. 2 (2010): 107–16. http://dx.doi.org/10.1057/ivs.2010.9.

Full text
Abstract:
Visualization is used by security analysts to help detect patterns and trends in large volumes of network traffic data. With IPv6 slowly being deployed around the world, network intruders are beginning to adapt their tools and techniques to work over IPv6 (versus IPv4). Many tools for visualizing network activity, while useful for detecting large-scale attacks and network behavior anomalies, still only support IPv4. In this article, we explore the current state of IPv6 support in some popular security visualization tools and identify the roadblocks preventing those tools from supporting the ne
APA, Harvard, Vancouver, ISO, and other styles
5

Lobachev, Oleg. "Direct visualization of cryptographic keys for enhanced security." Visual Computer 34, no. 12 (2017): 1749–59. http://dx.doi.org/10.1007/s00371-017-1466-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Conti, G., K. Abdullah, J. Grizzard, et al. "Countering security information overload through alert and packet visualization." IEEE Computer Graphics and Applications 26, no. 2 (2006): 60–70. http://dx.doi.org/10.1109/mcg.2006.30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tri Dang, Tran, and Tran Khanh Dang. "Visualization of web form submissions for security analysis." International Journal of Web Information Systems 9, no. 2 (2013): 165–80. http://dx.doi.org/10.1108/ijwis-12-2012-0036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Goodall, John R. "An Evaluation of Visual and Textual Network Analysis Tools." Information Visualization 10, no. 2 (2011): 145–57. http://dx.doi.org/10.1057/ivs.2011.2.

Full text
Abstract:
User testing is an integral component of user-centered design, but has only rarely been applied to visualization for cyber security applications. This article presents the results of a comparative evaluation between a visualization-based application and a more traditional, table-based application for analyzing computer network packet captures. We conducted this evaluation as part of the user-centered design process. Participants performed both structured, well-defined tasks and exploratory, open-ended tasks with both tools. We measured accuracy and efficiency for the well-defined tasks, number
APA, Harvard, Vancouver, ISO, and other styles
9

Jin Liu, Jing Sun, Zheng Q. Xu, and Lu Gao. "Security Web Release and Visualization of Remote Sensing Images." International Journal of Digital Content Technology and its Applications 4, no. 3 (2010): 146–53. http://dx.doi.org/10.4156/jdcta.vol4.issue3.15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Novikova, Evgenia Sergeevna, and Igor Vitalievich Kotenko. "Analysis of the Visualization Techniques used for Information Security in the Computer Networks." SPIIRAS Proceedings 4, no. 23 (2014): 7. http://dx.doi.org/10.15622/sp.23.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Khanh Dang, Tran, and Tran Tri Dang. "A survey on security visualization techniques for web information systems." International Journal of Web Information Systems 9, no. 1 (2013): 6–31. http://dx.doi.org/10.1108/17440081311316361.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Xu, Ya Ning. "Research on Process Control of Human Resource Management Based on Visualization Technology." Applied Mechanics and Materials 687-691 (November 2014): 2258–62. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2258.

Full text
Abstract:
With the development of computer and multimedia technology, social media platforms are widely used in various fields, so this paper introduces the design of network multimedia platform in the human resources management system, and designs a kind of new human resources management computer system. In order to improve the level of human resource management, it can introduce more talents and rational allocation human resources for enterprises, so we must improve the user generated content quality of social networking platform, eliminating spam behavior, and improving the social network human resou
APA, Harvard, Vancouver, ISO, and other styles
13

Одиноков, С. Б., В. В. Колючкин, Д. В. Кузьмин та ін. "Метод персонализации фотополимерных защитных голограмм на основе записи скрытых кодированных цифровых изображений". Оптика и спектроскопия 129, № 4 (2021): 393. http://dx.doi.org/10.21883/os.2021.04.50765.299-20.

Full text
Abstract:
This article deals with the problem of embedding personal data into replicated photopolymer security holograms with a maximal preservation of the hologram area during its visualization. A method of recording personalized security holograms on a photopolymer material is proposed. By this method main security hologram with a visualized image includes an additional computer-generated Fourier microhologram with individual personalized data. The synthesis algorithm and a technical implementation of the Fourier microhologram recording method are presented. The efficiency of the proposed method is co
APA, Harvard, Vancouver, ISO, and other styles
14

Yu, Xiaoying, and Qi Liao. "User password repetitive patterns analysis and visualization." Information & Computer Security 24, no. 1 (2016): 93–115. http://dx.doi.org/10.1108/ics-06-2015-0026.

Full text
Abstract:
Purpose – Passwords have been designed to protect individual privacy and security and widely used in almost every area of our life. The strength of passwords is therefore critical to the security of our systems. However, due to the explosion of user accounts and increasing complexity of password rules, users are struggling to find ways to make up sufficiently secure yet easy-to-remember passwords. This paper aims to investigate whether there are repetitive patterns when users choose passwords and how such behaviors may affect us to rethink password security policy. Design/methodology/approach
APA, Harvard, Vancouver, ISO, and other styles
15

Sonmez, Ferda Ozdemir, and Banu Gunel Kilic. "Holistic Web Application Security Visualization for Multi-Project and Multi-Phase Dynamic Application Security Test Results." IEEE Access 9 (2021): 25858–84. http://dx.doi.org/10.1109/access.2021.3057044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Chang, Juan, Jian Hua Zhang, Dian Ji Zhang, and Zhi Gang Liu. "Research on Computer Information System of Disaster Warning Based on ANSYS and MATLAB." Applied Mechanics and Materials 484-485 (January 2014): 958–62. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.958.

Full text
Abstract:
In this paper, we use the software of ANSYS and MATLAB to do research on early computer warning system. ANSYS can check the intensity of early warning system, and MATLAB can realize the visual function of warning system. In this paper we established the process model of ANSYS intensity checking, and designed the calculation process of order flow. We use the disaster warning when opencast mining to underground mining as an example to verify the model and the algorithm. Through the calculation we get the correlation table between calculated and measured value. Finally we get the biggest stress n
APA, Harvard, Vancouver, ISO, and other styles
17

Bai, Bing, Xue Jun Chen, En Qiang Zhu, Wan Xiao Xue, and Jie Yu. "Digital Urban Three-Dimensional Technique Base on OpenGL." Advanced Materials Research 726-731 (August 2013): 4568–71. http://dx.doi.org/10.4028/www.scientific.net/amr.726-731.4568.

Full text
Abstract:
With the fast development of computer multimedia technology, space technology, visualization technology, digital geomatics technology and computer graphics technology, using three-dimensional GIS technology to realize virtual visualization scene become reality. Three-dimensional GIS had already been applied to a lot of fields, such as country resource management, urban planning, public security system, electric power telecom branch. The paper had paid great attention to the popular three-dimensional GIS technology which had been in progress studying nowadays. It has summarized the research con
APA, Harvard, Vancouver, ISO, and other styles
18

Jang, Sejun, Shuyu Li, and Yunsick Sung. "FastText-Based Local Feature Visualization Algorithm for Merged Image-Based Malware Classification Framework for Cyber Security and Cyber Defense." Mathematics 8, no. 3 (2020): 460. http://dx.doi.org/10.3390/math8030460.

Full text
Abstract:
The importance of cybersecurity has recently been increasing. A malware coder writes malware into normal executable files. A computer is more likely to be infected by malware when users have easy access to various executables. Malware is considered as the starting point for cyber-attacks; thus, the timely detection, classification and blocking of malware are important. Malware visualization is a method for detecting or classifying malware. A global image is visualized through binaries extracted from malware. The overall structure and behavior of malware are considered when global images are ut
APA, Harvard, Vancouver, ISO, and other styles
19

Wu, Lili, Ganesh K. Venayagamoorthy, and Jinfeng Gao. "Online Steady-State Security Awareness Using Cellular Computation Networks and Fuzzy Techniques." Energies 14, no. 1 (2020): 148. http://dx.doi.org/10.3390/en14010148.

Full text
Abstract:
Power system steady-state security relates to its robustness under a normal state as well as to withstanding foreseeable contingencies without interruption to customer service. In this study, a novel cellular computation network (CCN) and hierarchical cellular rule-based fuzzy system (HCRFS) based online situation awareness method regarding steady-state security was proposed. A CCN-based two-layer mechanism was applied for voltage and active power flow prediction. HCRFS block was applied after the CCN prediction block to generate the security level of the power system. The security status of t
APA, Harvard, Vancouver, ISO, and other styles
20

Fu Lu, Liang, Jia Wan Zhang, Mao Lin Huang, and Lei Fu. "A new concentric-circle visualization of multi-dimensional data and its application in network security." Journal of Visual Languages & Computing 21, no. 4 (2010): 194–208. http://dx.doi.org/10.1016/j.jvlc.2010.05.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Dilla, William, Diane J. Janvrin, and Robyn Raschke. "Interactive Data Visualization: New Directions for Accounting Information Systems Research." Journal of Information Systems 24, no. 2 (2010): 1–37. http://dx.doi.org/10.2308/jis.2010.24.2.1.

Full text
Abstract:
ABSTRACT: Many companies today utilize interactive data visualization to present accounting information to external users on their investor relations websites and to internal users in applications such as enterprise resource planning, Balanced Scorecard, network security, and fraud detection systems. We develop a taxonomy for examining the current state of interactive data visualization research related to accounting decision making. We organize our review around three themes: the relationship between task characteristics and interactive data visualization techniques, the relationship between
APA, Harvard, Vancouver, ISO, and other styles
22

Benito-Santos, Alejandro, and Roberto Therón Sánchez. "Defragmenting Research Areas with Knowledge Visualization and Visual Text Analytics." Applied Sciences 10, no. 20 (2020): 7248. http://dx.doi.org/10.3390/app10207248.

Full text
Abstract:
The increasing specialization of science is motivating the fragmentation of traditional and well-established research areas into interdisciplinary communities of practice that focus on cooperation between experts to solve problems in a wide range of domains. This is the case of problem-driven visualization research (PDVR), in which groups of scholars use visualization techniques in different application domains such as the digital humanities, bioinformatics, sports science, or computer security. In this paper, we employ the findings obtained during the development of a novel visual text analyt
APA, Harvard, Vancouver, ISO, and other styles
23

Abid, Adnan, Ansar Abbas, Adel Khelifi, Muhammad Shoaib Farooq, Razi Iqbal, and Uzma Farooq. "An architectural framework for information integration using machine learning approaches for smart city security profiling." International Journal of Distributed Sensor Networks 16, no. 10 (2020): 155014772096547. http://dx.doi.org/10.1177/1550147720965473.

Full text
Abstract:
In the past few decades, the whole world has been badly affected by terrorism and other law-and-order situations. The newspapers have been covering terrorism and other law-and-order issues with relevant details. However, to the best of our knowledge, there is no existing information system that is capable of accumulating and analyzing these events to help in devising strategies to avoid and minimize such incidents in future. This research aims to provide a generic architectural framework to semi-automatically accumulate law-and-order-related news through different news portals and classify the
APA, Harvard, Vancouver, ISO, and other styles
24

Sharafaldin, Iman, Arash Habibi Lashkari, and Ali A. Ghorbani. "An evaluation framework for network security visualizations." Computers & Security 84 (July 2019): 70–92. http://dx.doi.org/10.1016/j.cose.2019.03.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Liu, Zhaoli, Xiaohong Guan, Shancang Li, Tao Qin, and Chao He. "Behavior Rhythm: A New Model for Behavior Visualization and Its Application in System Security Management." IEEE Access 6 (2018): 73940–51. http://dx.doi.org/10.1109/access.2018.2882812.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Meng, Linhao, Yating Wei, Rusheng Pan, Shuyue Zhou, Jianwei Zhang, and Wei Chen. "VADAF: Visualization for Abnormal Client Detection and Analysis in Federated Learning." ACM Transactions on Interactive Intelligent Systems 11, no. 3-4 (2021): 1–23. http://dx.doi.org/10.1145/3426866.

Full text
Abstract:
Federated Learning (FL) provides a powerful solution to distributed machine learning on a large corpus of decentralized data. It ensures privacy and security by performing computation on devices (which we refer to as clients) based on local data to improve the shared global model. However, the inaccessibility of the data and the invisibility of the computation make it challenging to interpret and analyze the training process, especially to distinguish potential client anomalies. Identifying these anomalies can help experts diagnose and improve FL models. For this reason, we propose a visual an
APA, Harvard, Vancouver, ISO, and other styles
27

de Paula, Rogério, Xianghua Ding, Paul Dourish, et al. "In the eye of the beholder: A visualization-based approach to information system security." International Journal of Human-Computer Studies 63, no. 1-2 (2005): 5–24. http://dx.doi.org/10.1016/j.ijhcs.2005.04.021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Golubev, Alexandr, Peter Bogatencov, and Grigore Secrieru. "DICOM data processing optimization in medical information systems." Scalable Computing: Practice and Experience 19, no. 2 (2018): 189–201. http://dx.doi.org/10.12694/scpe.v19i2.1399.

Full text
Abstract:
The problem of storage and visualization of medical images collected by various medical equipment is actual for latest 10 years for every medical institution. On the other hand, access to the medical investigation datasets and solving the problem of personal patient data security is important for scientific community and institutions that require this data. "DICOM Network" project was developed for solving these problems for different actors in the system based on the various customized roles. This article describes the problems and possible solutions for optimization of medical images storing
APA, Harvard, Vancouver, ISO, and other styles
29

Novikova, Evgenia, Igor Kotenko, and Ivan Murenin. "The Visual Analytics Approach for Analyzing Trajectories of Critical Infrastructure Employers." Energies 13, no. 15 (2020): 3936. http://dx.doi.org/10.3390/en13153936.

Full text
Abstract:
Employees of different critical infrastructures, including energy systems, are considered to be a security resource, and understanding their behavior patterns may leverage user and entity behavior analytics and improve organization capabilities in information threat detection such as insider threat and targeted attacks. Such behavior patterns are particularly critical for power stations and other energy companies. The paper presents a visual analytics approach to the exploratory analysis of the employees’ routes extracted from the logs of the access control system. Key elements of the approach
APA, Harvard, Vancouver, ISO, and other styles
30

Si, Nianwen, Wenlin Zhang, Dan Qu, Xiangyang Luo, Heyu Chang, and Tong Niu. "Spatial-Channel Attention-Based Class Activation Mapping for Interpreting CNN-Based Image Classification Models." Security and Communication Networks 2021 (May 31, 2021): 1–13. http://dx.doi.org/10.1155/2021/6682293.

Full text
Abstract:
Convolutional neural network (CNN) has been applied widely in various fields. However, it is always hindered by the unexplainable characteristics. Users cannot know why a CNN-based model produces certain recognition results, which is a vulnerability of CNN from the security perspective. To alleviate this problem, in this study, the three existing feature visualization methods of CNN are analyzed in detail firstly, and a unified visualization framework for interpreting the recognition results of CNN is presented. Here, class activation weight (CAW) is considered as the most important factor in
APA, Harvard, Vancouver, ISO, and other styles
31

Wang, Weichao, and Aidong Lu. "Interactive Wormhole Detection and Evaluation." Information Visualization 6, no. 1 (2007): 3–17. http://dx.doi.org/10.1057/palgrave.ivs.9500144.

Full text
Abstract:
Wormhole attacks in wireless networks can severely deteriorate network performance and compromise security through spoiling the routing protocols and weakening the security enhancements. This paper develops an approach, interactive visualization of wormholes (IVoW), to monitor and detect such attacks in large-scale wireless networks in real time. We characterize the topology features of a network under wormhole attacks through the node position changes and visualize the information at dynamically adjusted scales. We integrate an automatic detection algorithm with appropriate user interactions
APA, Harvard, Vancouver, ISO, and other styles
32

Figueiredo, Ciro, and Caroline Mota. "Learning Preferences in a Spatial Multiple Criteria Decision Approach: An Application in Public Security Planning." International Journal of Information Technology & Decision Making 18, no. 04 (2019): 1403–32. http://dx.doi.org/10.1142/s0219622019500251.

Full text
Abstract:
This study presents a model to identify and classify vulnerable places regarding violence in public areas. The model considers multiple objectives and multiple viewpoints by using a graphical visualization for exploring vulnerability. The methodology is supported by a Dominance-based rough set approach in conjunction with preference learning and Geographic Information Systems, and requires the use of decision-makers’ (DMs’) previous knowledge for holistic assessment to get individual results. We considered an original approach for aggregating those individual results to obtain a recommendation
APA, Harvard, Vancouver, ISO, and other styles
33

V, Dr Suma. "Automatic Spotting of Sceptical Activity with Visualization Using Elastic Cluster for Network Traffic in Educational Campus." Journal of Ubiquitous Computing and Communication Technologies 2, no. 2 (2020): 88–97. http://dx.doi.org/10.36548/jucct.2020.2.004.

Full text
Abstract:
An automatic sceptical recognition model to identify the suspicious or the malicious activity in the network of the educational institutional campus is laid out in the paper. The carried out work in the paper kindles the network traffic flow in the educational campus and identifies the unwanted activities and stops them. The detected activities are visualized in the real time using a personalized reportage dash board. The design integrates the open source tools to provide an accurate evaluation utilizing the engine for the identifying and preventing the suspicious activities. The suspicious ev
APA, Harvard, Vancouver, ISO, and other styles
34

Baciu, George, Chenhui Li, Yunzhe Wang, and Xiujun Zhang. "Cloudet." International Journal of Cognitive Informatics and Natural Intelligence 10, no. 1 (2016): 12–31. http://dx.doi.org/10.4018/ijcini.2016010102.

Full text
Abstract:
Streaming data cognition has become a dominant problem in interactive visual analytics for event detection, meteorology, cosmology, security, and smart city applications. In order to interact with streaming data patterns in an elastic cloud environment, we present a new elastic framework for big data visual analytics in the cloud, the Cloudet. The Cloudet is a self-adaptive cloud-based platform that treats both data and compute nodes as elastic objects. The main objective is to readily achieve the scalability and elasticity of cloud computing platforms in order to process large streaming data
APA, Harvard, Vancouver, ISO, and other styles
35

Hingant, Javier, Marcelo Zambrano, Francisco J. Pérez, Israel Pérez, and Manuel Esteve. "HYBINT: A Hybrid Intelligence System for Critical Infrastructures Protection." Security and Communication Networks 2018 (August 27, 2018): 1–13. http://dx.doi.org/10.1155/2018/5625860.

Full text
Abstract:
Cyberattacks, which consist of exploiting security vulnerabilities of computer networks and systems for any kind of malicious purpose (e.g., extortion, data steal, assets hijacking), have been continuously increasing worldwide in recent years. Cyberspace appears today as a new battlefield, along with physical world scenarios (land, sea, air, and space), for the organizations defence and security. Besides, by the fact that attacks from the physical world may have significant implications in the cyber world and vice versa, these dimensions cannot be understood independently. However, the most co
APA, Harvard, Vancouver, ISO, and other styles
36

Bayrak, Tuncay. "Identifying Technical Requirements for a Mobile Business Analytics Application." International Journal of Business Analytics 8, no. 4 (2021): 91–103. http://dx.doi.org/10.4018/ijban.2021100106.

Full text
Abstract:
This study identifies various technical requirements for business analytics applications designed and optimized for mobile devices. Such applications would enable the mobile workforce to gain business insights regardless of their physical locations. In order for the mobile workforce to be efficient and effective, they need to be able to use the browsers and applications designed specifically for the mobile devices to access data, similar to desktop computers. Based on the research, such factors as online and off-line data analysis capabilities, data visualization capabilities, and security iss
APA, Harvard, Vancouver, ISO, and other styles
37

Fan, Youping, Xin Li, and Peng Zhang. "Integrated Approach for Online Dynamic Security Assessment With Credibility and Visualization Based on Exploring Connotative Associations in Massive Data." IEEE Access 5 (2017): 16555–67. http://dx.doi.org/10.1109/access.2017.2739818.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Kagawa, Takuhiro, Sachio Saiki, and Masahide Nakamura. "Analyzing street crimes in Kobe city using PRISM." International Journal of Web Information Systems 15, no. 2 (2019): 183–200. http://dx.doi.org/10.1108/ijwis-04-2018-0032.

Full text
Abstract:
Purpose In a previous research, the authors proposed a security information service, called Personalized Real-time Information with Security Map (PRISM), which personalizes the incident information based on living area of individual users. The purpose of this paper is to extend PRISM to conduct sophisticated analysis of street crimes. The extended features enable to look back on past incident information and perform statistical analysis. Design/methodology/approach To analyze street crimes around living area in more detail, the authors add three new features to PRISM: showing a past heat map,
APA, Harvard, Vancouver, ISO, and other styles
39

Ossio, Raul, O. Isaac Garcia-Salinas, Diego Said Anaya-Mancilla, et al. "VCF/Plotein: visualization and prioritization of genomic variants from human exome sequencing projects." Bioinformatics 35, no. 22 (2019): 4803–5. http://dx.doi.org/10.1093/bioinformatics/btz458.

Full text
Abstract:
Abstract Motivation Identifying disease-causing variants from exome sequencing projects remains a challenging task that often requires bioinformatics expertise. Here we describe a user-friendly graphical application that allows medical professionals and bench biologists to prioritize and visualize genetic variants from human exome sequencing data. Results We have implemented VCF/Plotein, a graphical, fully interactive web application able to display exome sequencing data in VCF format. Gene and variant information is extracted from Ensembl. Cross-referencing with external databases and applica
APA, Harvard, Vancouver, ISO, and other styles
40

Chen, Victor Y., Ahmad M. Razip, Sungahn Ko, Cheryl Z. Qian, and David S. Ebert. "Multi-aspect visual analytics on large-scale high-dimensional cyber security data." Information Visualization 14, no. 1 (2013): 62–75. http://dx.doi.org/10.1177/1473871613488573.

Full text
Abstract:
In this article, we present a visual analytics system, SemanticPrism, which aims to analyze large-scale high-dimensional cyber security datasets containing logs of a million computers. SemanticPrism visualizes the data from three different perspectives: spatiotemporal distribution, overall temporal trends, and pixel-based IP (Internet Protocol) address blocks. With each perspective, we use semantic zooming to present more detailed information. The interlinked visualizations and multiple levels of detail allow us to detect unexpected changes taking place in different dimensions of the data and
APA, Harvard, Vancouver, ISO, and other styles
41

Dihl, Leandro, Leandro Cruz, and Nuno Gonçalves. "Card3DFace—An Application to Enhance 3D Visual Validation in ID Cards and Travel Documents." Applied Sciences 11, no. 19 (2021): 8821. http://dx.doi.org/10.3390/app11198821.

Full text
Abstract:
The identification of a person is a natural way to gain access to information or places. A face image is an essential element of visual validation. In this paper, we present the Card3DFace application, which captures a single-shot image of a person’s face. After reconstructing the 3D model of the head, the application generates several images from different perspectives, which, when printed on a card with a layer of lenticular lenses, produce a 3D visualization effect of the face. The image acquisition is achieved with a regular consumer 3D camera, either using plenoptic, stereo or time-of-fli
APA, Harvard, Vancouver, ISO, and other styles
42

Wanner, Franz, Wolfgang Jentner, Tobias Schreck, Andreas Stoffel, Lyubka Sharalieva, and Daniel A. Keim. "Integrated visual analysis of patterns in time series and text data - Workflow and application to financial data analysis." Information Visualization 15, no. 1 (2015): 75–90. http://dx.doi.org/10.1177/1473871615576925.

Full text
Abstract:
In this article, we describe a workflow and tool that allows a flexible formation of hypotheses about text features and their combinations, which are significantly connected in time to quantitative phenomena observed in stock data. To support such an analysis, we combine the analysis steps of frequent quantitative and text-oriented data using an existing a priori method. First, based on heuristics, we extract interesting intervals and patterns in large time series data. The visual analysis supports the analyst in exploring parameter combinations and their results. The identified time series pa
APA, Harvard, Vancouver, ISO, and other styles
43

Robertson, George, David Ebert, Stephen Eick, Daniel Keim, and Ken Joy. "Scale and Complexity in Visual Analytics." Information Visualization 8, no. 4 (2009): 247–53. http://dx.doi.org/10.1057/ivs.2009.23.

Full text
Abstract:
The fundamental problem that we face is that a variety of large-scale problems in security, public safety, energy, ecology, health care and basic science all require that we process and understand increasingly vast amounts and variety of data. There is a growing impedance mismatch between data size/complexity and the human ability to understand and interact with data. Visual analytic tools are intended to help reduce that impedance mismatch by using analytic tools to reduce the amount of data that must be viewed, and visualization tools to help understand the patterns and relationships in the
APA, Harvard, Vancouver, ISO, and other styles
44

Obagbuwa, Ibidun Christiana, and Ademola P. Abidoye. "South Africa Crime Visualization, Trends Analysis, and Prediction Using Machine Learning Linear Regression Technique." Applied Computational Intelligence and Soft Computing 2021 (June 8, 2021): 1–14. http://dx.doi.org/10.1155/2021/5537902.

Full text
Abstract:
South Africa has been classified as one of the most homicidal, violent, and dangerous places across the globe. However, the two elements that pushed South Africa high in the crime rank are the rates of social violence and homicide. It was reported by Business Insider that South Africa is among the most top 15 ferocious nations on earth. By 1995, South Africa was rated the second highest in terms of murder. However, the crime rate has reduced for some years and suddenly rose again in recent years. Due to social violence and crime rates in South Africa, foreign investors are no longer interested
APA, Harvard, Vancouver, ISO, and other styles
45

Cook, Kristin, Georges Grinstein, and Mark Whiting. "The VAST Challenge: history, scope, and outcomes: An introduction to the Special Issue." Information Visualization 13, no. 4 (2013): 301–12. http://dx.doi.org/10.1177/1473871613490678.

Full text
Abstract:
The annual Visual Analytics Science and Technology (VAST) challenge provides Visual Analytics researchers, developers, and designers an opportunity to apply their best tools and techniques against invented problems that include a realistic scenario, data, tasks, and questions to be answered. Submissions are processed much like conference papers, contestants are provided reviewer feedback, and excellence is recognized with awards. A day-long VAST Challenge workshop takes place each year at the IEEE VAST conference to share results and recognize outstanding submissions. Short papers are publishe
APA, Harvard, Vancouver, ISO, and other styles
46

Huang, Ruhua, Chunying Wang, Xiaoyu Zhang, Dan Wu, and Qingwen Xie. "Design, develop and evaluate an open government data platform: a user-centred approach." Electronic Library 37, no. 3 (2019): 550–62. http://dx.doi.org/10.1108/el-02-2019-0037.

Full text
Abstract:
Purpose The purpose of this paper is to describe the process of designing, developing and evaluating a prototype of an open government data (OGD) platform that provided user-centred experiences. Design/methodology/approach Based on the OGD lifecycle, an OGD prototype was created, which involved the system functionality, user interface, standard specification and security mechanism. The main functionalities of the system included data acquisition, data processing and data management. A usability test was conducted following the prototype implementation. Findings The usability test indicated tha
APA, Harvard, Vancouver, ISO, and other styles
47

Fischer, Fabian, Johannes Fuchs, Florian Mansmann, and Daniel A. Keim. "BANKSAFE: Visual analytics for big data in large-scale computer networks." Information Visualization 14, no. 1 (2013): 51–61. http://dx.doi.org/10.1177/1473871613488572.

Full text
Abstract:
The enormous growth of data in the last decades led to a wide variety of different database technologies. Nowadays, we are capable of storing vast amounts of structured and unstructured data. To address the challenge of exploring and making sense out of big data using visual analytics, the tight integration of such backend services is needed. In this article, we introduce BANKSAFE, which was built for the VAST Challenge 2012 and won the outstanding comprehensive submission award. BANKSAFE is based on modern database technologies and is capable of visually analyzing vast amounts of monitoring d
APA, Harvard, Vancouver, ISO, and other styles
48

Schweitzer, Dino, Jeff Boleng, Colin Hughes, and Louis Murphy. "Visualizing Keyboard Pattern Passwords." Information Visualization 10, no. 2 (2010): 127–33. http://dx.doi.org/10.1057/ivs.2010.12.

Full text
Abstract:
Passwords are fundamental security vulnerabilities in many systems. Several researchers have investigated the trade-off between password memorability versus resiliency to cracking and have looked at alternative systems such as graphical passwords and biometrics. To create stronger passwords, many systems enforce rules regarding the required length and types of characters passwords must contain. Another suggested approach is to use passphrases to combat dictionary attacks. One common ‘trick’ used to remember passwords that conform to complex rules is to select a pattern of keys on the keyboard.
APA, Harvard, Vancouver, ISO, and other styles
49

Lakhno, Valeriy, Volodimir Malyukov, Berik Akhmetov, Dmytro Kasatkin, and Liubov Plyska. "Development of a model for choosing strategies for investing in information security." Eastern-European Journal of Enterprise Technologies 2, no. 3 (110) (2021): 43–51. http://dx.doi.org/10.15587/1729-4061.2021.228313.

Full text
Abstract:
This paper has proposed a model of the computational core for the decision support system (DSS) when investing in the projects of information security (IS) of the objects of informatization (OBI). Including those OBI that can be categorized as critically important. Unlike existing solutions, the proposed model deals with decision-making issues in the ongoing process of investing in the projects to ensure the OBI IS by a group of investors. The calculations were based on the bilinear differential quality games with several terminal surfaces. Finding a solution to these games is a big challenge.
APA, Harvard, Vancouver, ISO, and other styles
50

Kwon, Hyun, Hyunsoo Yoon, and Ki-Woong Park. "Selective Poisoning Attack on Deep Neural Networks †." Symmetry 11, no. 7 (2019): 892. http://dx.doi.org/10.3390/sym11070892.

Full text
Abstract:
Studies related to pattern recognition and visualization using computer technology have been introduced. In particular, deep neural networks (DNNs) provide good performance for image, speech, and pattern recognition. However, a poisoning attack is a serious threat to a DNN’s security. A poisoning attack reduces the accuracy of a DNN by adding malicious training data during the training process. In some situations, it may be necessary to drop a specifically chosen class of accuracy from the model. For example, if an attacker specifically disallows nuclear facilities to be selectively recognized
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!