Journal articles on the topic 'Visualization for computer security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Visualization for computer security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Ma, Kwan-Liu. "Visualization for security." ACM SIGGRAPH Computer Graphics 38, no. 4 (2004): 4–6. http://dx.doi.org/10.1145/1039140.1039146.
Full textYuan, Xiaohong, Percy Vega, Yaseen Qadah, Ricky Archer, Huiming Yu, and Jinsheng Xu. "Visualization Tools for Teaching Computer Security." ACM Transactions on Computing Education 9, no. 4 (2010): 1–28. http://dx.doi.org/10.1145/1656255.1656258.
Full textZhang, Yanping, Yang Xiao, Min Chen, Jingyuan Zhang, and Hongmei Deng. "A survey of security visualization for computer network logs." Security and Communication Networks 5, no. 4 (2011): 404–21. http://dx.doi.org/10.1002/sec.324.
Full textBarrera, David, and Paul C. van Oorschot. "Accommodating IPv6 Addresses in Security Visualization Tools." Information Visualization 10, no. 2 (2010): 107–16. http://dx.doi.org/10.1057/ivs.2010.9.
Full textLobachev, Oleg. "Direct visualization of cryptographic keys for enhanced security." Visual Computer 34, no. 12 (2017): 1749–59. http://dx.doi.org/10.1007/s00371-017-1466-6.
Full textConti, G., K. Abdullah, J. Grizzard, et al. "Countering security information overload through alert and packet visualization." IEEE Computer Graphics and Applications 26, no. 2 (2006): 60–70. http://dx.doi.org/10.1109/mcg.2006.30.
Full textTri Dang, Tran, and Tran Khanh Dang. "Visualization of web form submissions for security analysis." International Journal of Web Information Systems 9, no. 2 (2013): 165–80. http://dx.doi.org/10.1108/ijwis-12-2012-0036.
Full textGoodall, John R. "An Evaluation of Visual and Textual Network Analysis Tools." Information Visualization 10, no. 2 (2011): 145–57. http://dx.doi.org/10.1057/ivs.2011.2.
Full textJin Liu, Jing Sun, Zheng Q. Xu, and Lu Gao. "Security Web Release and Visualization of Remote Sensing Images." International Journal of Digital Content Technology and its Applications 4, no. 3 (2010): 146–53. http://dx.doi.org/10.4156/jdcta.vol4.issue3.15.
Full textNovikova, Evgenia Sergeevna, and Igor Vitalievich Kotenko. "Analysis of the Visualization Techniques used for Information Security in the Computer Networks." SPIIRAS Proceedings 4, no. 23 (2014): 7. http://dx.doi.org/10.15622/sp.23.1.
Full textKhanh Dang, Tran, and Tran Tri Dang. "A survey on security visualization techniques for web information systems." International Journal of Web Information Systems 9, no. 1 (2013): 6–31. http://dx.doi.org/10.1108/17440081311316361.
Full textXu, Ya Ning. "Research on Process Control of Human Resource Management Based on Visualization Technology." Applied Mechanics and Materials 687-691 (November 2014): 2258–62. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2258.
Full textОдиноков, С. Б., В. В. Колючкин, Д. В. Кузьмин та ін. "Метод персонализации фотополимерных защитных голограмм на основе записи скрытых кодированных цифровых изображений". Оптика и спектроскопия 129, № 4 (2021): 393. http://dx.doi.org/10.21883/os.2021.04.50765.299-20.
Full textYu, Xiaoying, and Qi Liao. "User password repetitive patterns analysis and visualization." Information & Computer Security 24, no. 1 (2016): 93–115. http://dx.doi.org/10.1108/ics-06-2015-0026.
Full textSonmez, Ferda Ozdemir, and Banu Gunel Kilic. "Holistic Web Application Security Visualization for Multi-Project and Multi-Phase Dynamic Application Security Test Results." IEEE Access 9 (2021): 25858–84. http://dx.doi.org/10.1109/access.2021.3057044.
Full textChang, Juan, Jian Hua Zhang, Dian Ji Zhang, and Zhi Gang Liu. "Research on Computer Information System of Disaster Warning Based on ANSYS and MATLAB." Applied Mechanics and Materials 484-485 (January 2014): 958–62. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.958.
Full textBai, Bing, Xue Jun Chen, En Qiang Zhu, Wan Xiao Xue, and Jie Yu. "Digital Urban Three-Dimensional Technique Base on OpenGL." Advanced Materials Research 726-731 (August 2013): 4568–71. http://dx.doi.org/10.4028/www.scientific.net/amr.726-731.4568.
Full textJang, Sejun, Shuyu Li, and Yunsick Sung. "FastText-Based Local Feature Visualization Algorithm for Merged Image-Based Malware Classification Framework for Cyber Security and Cyber Defense." Mathematics 8, no. 3 (2020): 460. http://dx.doi.org/10.3390/math8030460.
Full textWu, Lili, Ganesh K. Venayagamoorthy, and Jinfeng Gao. "Online Steady-State Security Awareness Using Cellular Computation Networks and Fuzzy Techniques." Energies 14, no. 1 (2020): 148. http://dx.doi.org/10.3390/en14010148.
Full textFu Lu, Liang, Jia Wan Zhang, Mao Lin Huang, and Lei Fu. "A new concentric-circle visualization of multi-dimensional data and its application in network security." Journal of Visual Languages & Computing 21, no. 4 (2010): 194–208. http://dx.doi.org/10.1016/j.jvlc.2010.05.002.
Full textDilla, William, Diane J. Janvrin, and Robyn Raschke. "Interactive Data Visualization: New Directions for Accounting Information Systems Research." Journal of Information Systems 24, no. 2 (2010): 1–37. http://dx.doi.org/10.2308/jis.2010.24.2.1.
Full textBenito-Santos, Alejandro, and Roberto Therón Sánchez. "Defragmenting Research Areas with Knowledge Visualization and Visual Text Analytics." Applied Sciences 10, no. 20 (2020): 7248. http://dx.doi.org/10.3390/app10207248.
Full textAbid, Adnan, Ansar Abbas, Adel Khelifi, Muhammad Shoaib Farooq, Razi Iqbal, and Uzma Farooq. "An architectural framework for information integration using machine learning approaches for smart city security profiling." International Journal of Distributed Sensor Networks 16, no. 10 (2020): 155014772096547. http://dx.doi.org/10.1177/1550147720965473.
Full textSharafaldin, Iman, Arash Habibi Lashkari, and Ali A. Ghorbani. "An evaluation framework for network security visualizations." Computers & Security 84 (July 2019): 70–92. http://dx.doi.org/10.1016/j.cose.2019.03.005.
Full textLiu, Zhaoli, Xiaohong Guan, Shancang Li, Tao Qin, and Chao He. "Behavior Rhythm: A New Model for Behavior Visualization and Its Application in System Security Management." IEEE Access 6 (2018): 73940–51. http://dx.doi.org/10.1109/access.2018.2882812.
Full textMeng, Linhao, Yating Wei, Rusheng Pan, Shuyue Zhou, Jianwei Zhang, and Wei Chen. "VADAF: Visualization for Abnormal Client Detection and Analysis in Federated Learning." ACM Transactions on Interactive Intelligent Systems 11, no. 3-4 (2021): 1–23. http://dx.doi.org/10.1145/3426866.
Full textde Paula, Rogério, Xianghua Ding, Paul Dourish, et al. "In the eye of the beholder: A visualization-based approach to information system security." International Journal of Human-Computer Studies 63, no. 1-2 (2005): 5–24. http://dx.doi.org/10.1016/j.ijhcs.2005.04.021.
Full textGolubev, Alexandr, Peter Bogatencov, and Grigore Secrieru. "DICOM data processing optimization in medical information systems." Scalable Computing: Practice and Experience 19, no. 2 (2018): 189–201. http://dx.doi.org/10.12694/scpe.v19i2.1399.
Full textNovikova, Evgenia, Igor Kotenko, and Ivan Murenin. "The Visual Analytics Approach for Analyzing Trajectories of Critical Infrastructure Employers." Energies 13, no. 15 (2020): 3936. http://dx.doi.org/10.3390/en13153936.
Full textSi, Nianwen, Wenlin Zhang, Dan Qu, Xiangyang Luo, Heyu Chang, and Tong Niu. "Spatial-Channel Attention-Based Class Activation Mapping for Interpreting CNN-Based Image Classification Models." Security and Communication Networks 2021 (May 31, 2021): 1–13. http://dx.doi.org/10.1155/2021/6682293.
Full textWang, Weichao, and Aidong Lu. "Interactive Wormhole Detection and Evaluation." Information Visualization 6, no. 1 (2007): 3–17. http://dx.doi.org/10.1057/palgrave.ivs.9500144.
Full textFigueiredo, Ciro, and Caroline Mota. "Learning Preferences in a Spatial Multiple Criteria Decision Approach: An Application in Public Security Planning." International Journal of Information Technology & Decision Making 18, no. 04 (2019): 1403–32. http://dx.doi.org/10.1142/s0219622019500251.
Full textV, Dr Suma. "Automatic Spotting of Sceptical Activity with Visualization Using Elastic Cluster for Network Traffic in Educational Campus." Journal of Ubiquitous Computing and Communication Technologies 2, no. 2 (2020): 88–97. http://dx.doi.org/10.36548/jucct.2020.2.004.
Full textBaciu, George, Chenhui Li, Yunzhe Wang, and Xiujun Zhang. "Cloudet." International Journal of Cognitive Informatics and Natural Intelligence 10, no. 1 (2016): 12–31. http://dx.doi.org/10.4018/ijcini.2016010102.
Full textHingant, Javier, Marcelo Zambrano, Francisco J. Pérez, Israel Pérez, and Manuel Esteve. "HYBINT: A Hybrid Intelligence System for Critical Infrastructures Protection." Security and Communication Networks 2018 (August 27, 2018): 1–13. http://dx.doi.org/10.1155/2018/5625860.
Full textBayrak, Tuncay. "Identifying Technical Requirements for a Mobile Business Analytics Application." International Journal of Business Analytics 8, no. 4 (2021): 91–103. http://dx.doi.org/10.4018/ijban.2021100106.
Full textFan, Youping, Xin Li, and Peng Zhang. "Integrated Approach for Online Dynamic Security Assessment With Credibility and Visualization Based on Exploring Connotative Associations in Massive Data." IEEE Access 5 (2017): 16555–67. http://dx.doi.org/10.1109/access.2017.2739818.
Full textKagawa, Takuhiro, Sachio Saiki, and Masahide Nakamura. "Analyzing street crimes in Kobe city using PRISM." International Journal of Web Information Systems 15, no. 2 (2019): 183–200. http://dx.doi.org/10.1108/ijwis-04-2018-0032.
Full textOssio, Raul, O. Isaac Garcia-Salinas, Diego Said Anaya-Mancilla, et al. "VCF/Plotein: visualization and prioritization of genomic variants from human exome sequencing projects." Bioinformatics 35, no. 22 (2019): 4803–5. http://dx.doi.org/10.1093/bioinformatics/btz458.
Full textChen, Victor Y., Ahmad M. Razip, Sungahn Ko, Cheryl Z. Qian, and David S. Ebert. "Multi-aspect visual analytics on large-scale high-dimensional cyber security data." Information Visualization 14, no. 1 (2013): 62–75. http://dx.doi.org/10.1177/1473871613488573.
Full textDihl, Leandro, Leandro Cruz, and Nuno Gonçalves. "Card3DFace—An Application to Enhance 3D Visual Validation in ID Cards and Travel Documents." Applied Sciences 11, no. 19 (2021): 8821. http://dx.doi.org/10.3390/app11198821.
Full textWanner, Franz, Wolfgang Jentner, Tobias Schreck, Andreas Stoffel, Lyubka Sharalieva, and Daniel A. Keim. "Integrated visual analysis of patterns in time series and text data - Workflow and application to financial data analysis." Information Visualization 15, no. 1 (2015): 75–90. http://dx.doi.org/10.1177/1473871615576925.
Full textRobertson, George, David Ebert, Stephen Eick, Daniel Keim, and Ken Joy. "Scale and Complexity in Visual Analytics." Information Visualization 8, no. 4 (2009): 247–53. http://dx.doi.org/10.1057/ivs.2009.23.
Full textObagbuwa, Ibidun Christiana, and Ademola P. Abidoye. "South Africa Crime Visualization, Trends Analysis, and Prediction Using Machine Learning Linear Regression Technique." Applied Computational Intelligence and Soft Computing 2021 (June 8, 2021): 1–14. http://dx.doi.org/10.1155/2021/5537902.
Full textCook, Kristin, Georges Grinstein, and Mark Whiting. "The VAST Challenge: history, scope, and outcomes: An introduction to the Special Issue." Information Visualization 13, no. 4 (2013): 301–12. http://dx.doi.org/10.1177/1473871613490678.
Full textHuang, Ruhua, Chunying Wang, Xiaoyu Zhang, Dan Wu, and Qingwen Xie. "Design, develop and evaluate an open government data platform: a user-centred approach." Electronic Library 37, no. 3 (2019): 550–62. http://dx.doi.org/10.1108/el-02-2019-0037.
Full textFischer, Fabian, Johannes Fuchs, Florian Mansmann, and Daniel A. Keim. "BANKSAFE: Visual analytics for big data in large-scale computer networks." Information Visualization 14, no. 1 (2013): 51–61. http://dx.doi.org/10.1177/1473871613488572.
Full textSchweitzer, Dino, Jeff Boleng, Colin Hughes, and Louis Murphy. "Visualizing Keyboard Pattern Passwords." Information Visualization 10, no. 2 (2010): 127–33. http://dx.doi.org/10.1057/ivs.2010.12.
Full textLakhno, Valeriy, Volodimir Malyukov, Berik Akhmetov, Dmytro Kasatkin, and Liubov Plyska. "Development of a model for choosing strategies for investing in information security." Eastern-European Journal of Enterprise Technologies 2, no. 3 (110) (2021): 43–51. http://dx.doi.org/10.15587/1729-4061.2021.228313.
Full textKwon, Hyun, Hyunsoo Yoon, and Ki-Woong Park. "Selective Poisoning Attack on Deep Neural Networks †." Symmetry 11, no. 7 (2019): 892. http://dx.doi.org/10.3390/sym11070892.
Full text