Literatura académica sobre el tema "Visualization for computer security"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Visualization for computer security".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Artículos de revistas sobre el tema "Visualization for computer security"

1

Ma, Kwan-Liu. "Visualization for security." ACM SIGGRAPH Computer Graphics 38, no. 4 (2004): 4–6. http://dx.doi.org/10.1145/1039140.1039146.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Yuan, Xiaohong, Percy Vega, Yaseen Qadah, Ricky Archer, Huiming Yu, and Jinsheng Xu. "Visualization Tools for Teaching Computer Security." ACM Transactions on Computing Education 9, no. 4 (2010): 1–28. http://dx.doi.org/10.1145/1656255.1656258.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Zhang, Yanping, Yang Xiao, Min Chen, Jingyuan Zhang, and Hongmei Deng. "A survey of security visualization for computer network logs." Security and Communication Networks 5, no. 4 (2011): 404–21. http://dx.doi.org/10.1002/sec.324.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Barrera, David, and Paul C. van Oorschot. "Accommodating IPv6 Addresses in Security Visualization Tools." Information Visualization 10, no. 2 (2010): 107–16. http://dx.doi.org/10.1057/ivs.2010.9.

Texto completo
Resumen
Visualization is used by security analysts to help detect patterns and trends in large volumes of network traffic data. With IPv6 slowly being deployed around the world, network intruders are beginning to adapt their tools and techniques to work over IPv6 (versus IPv4). Many tools for visualizing network activity, while useful for detecting large-scale attacks and network behavior anomalies, still only support IPv4. In this article, we explore the current state of IPv6 support in some popular security visualization tools and identify the roadblocks preventing those tools from supporting the ne
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Lobachev, Oleg. "Direct visualization of cryptographic keys for enhanced security." Visual Computer 34, no. 12 (2017): 1749–59. http://dx.doi.org/10.1007/s00371-017-1466-6.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Conti, G., K. Abdullah, J. Grizzard, et al. "Countering security information overload through alert and packet visualization." IEEE Computer Graphics and Applications 26, no. 2 (2006): 60–70. http://dx.doi.org/10.1109/mcg.2006.30.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Tri Dang, Tran, and Tran Khanh Dang. "Visualization of web form submissions for security analysis." International Journal of Web Information Systems 9, no. 2 (2013): 165–80. http://dx.doi.org/10.1108/ijwis-12-2012-0036.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Goodall, John R. "An Evaluation of Visual and Textual Network Analysis Tools." Information Visualization 10, no. 2 (2011): 145–57. http://dx.doi.org/10.1057/ivs.2011.2.

Texto completo
Resumen
User testing is an integral component of user-centered design, but has only rarely been applied to visualization for cyber security applications. This article presents the results of a comparative evaluation between a visualization-based application and a more traditional, table-based application for analyzing computer network packet captures. We conducted this evaluation as part of the user-centered design process. Participants performed both structured, well-defined tasks and exploratory, open-ended tasks with both tools. We measured accuracy and efficiency for the well-defined tasks, number
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Jin Liu, Jing Sun, Zheng Q. Xu, and Lu Gao. "Security Web Release and Visualization of Remote Sensing Images." International Journal of Digital Content Technology and its Applications 4, no. 3 (2010): 146–53. http://dx.doi.org/10.4156/jdcta.vol4.issue3.15.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Novikova, Evgenia Sergeevna, and Igor Vitalievich Kotenko. "Analysis of the Visualization Techniques used for Information Security in the Computer Networks." SPIIRAS Proceedings 4, no. 23 (2014): 7. http://dx.doi.org/10.15622/sp.23.1.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Más fuentes

Tesis sobre el tema "Visualization for computer security"

1

Teoh, Soon Tee. "Interactive visualization techniques for computer network security /." For electronic version search Digital dissertations database. Restricted to UC campuses. Access is free to UC campus dissertations, 2004. http://uclibs.org/PID/11984.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Whitaker, Robert Bruce. "Applying Information Visualization to Computer Security Applications." DigitalCommons@USU, 2010. https://digitalcommons.usu.edu/etd/636.

Texto completo
Resumen
This thesis presents two phases of research in applying visualization to network security challenges. The first phase included discovering the most useful and powerful features in existing computer security visualizations and incorporating them into the AdviseAid visualization platform, an existing software package. The incorporation of such a complete feature set required novel resolution of software engineering, human factors, and computer graphics issues. We also designed additional novel features, such as plugin interfaces, allowing for rapid prototyping and experimentation with novel v
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Luse, Andrew William. "Exploring utilization of visualization for computer and network security." [Ames, Iowa : Iowa State University], 2009.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Abdullah, Kulsoom B. "Scaling and Visualizing Network Data to Facilitate in Intrusion Detection Tasks." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/10509.

Texto completo
Resumen
As the trend of successful network attacks continue to rise, better forms of intrusion, detection and prevention are needed. This thesis addresses network traffic visualization techniques that aid administrators in recognizing attacks. A view of port statistics and Intrusion Detection System (IDS) alerts has been developed. Each help to address issues with analyzing large datasets involving networks. Due to the amount of traffic as well as the range of possible port numbers and IP addresses, scaling techniques are necessary. A port-based overview of network activity produces an improved r
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Nunnally, Troy J. "Advanced visualizations for network security." Diss., Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/52993.

Texto completo
Resumen
Monitoring volumes of malicious network data for across multiple sources can potentially be overwhelming. As a result, vital data is at a greater risk of being overlooked and the time span for analyzing it could be too lengthy. One way to address this issue is to employ network security visualization techniques to evaluate security risks and identify malicious activity to help mitigate compromised nodes on a network. The purpose of this thesis is to introduce a visualization framework to help reduce task-completion time, enhance situational awareness, and decrease user error of complex visua
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Freet, David Nathan. "A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency." Thesis, Indiana State University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10261868.

Texto completo
Resumen
<p> The flood of raw data generated by intrusion detection and other network monitoring devices can be so overwhelming that it causes great difficulty in detecting patterns that might indicate malicious traffic. In order to more effectively monitor and process network and forensic data within a virtualized environment, Security Visualization (SecViz) provides software-based visual interfaces to analyze live and logged network data within the domains of network security, network and cloud forensics, attack prevention, compliance management, wireless security, secure coding, and penetration test
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Kasemsri, Rawiroj Robert. "A Survey, Taxonomy, and Analysis of Network Security Visualization Techniques." Digital Archive @ GSU, 2006. http://digitalarchive.gsu.edu/cs_theses/17.

Texto completo
Resumen
Network security visualization is a relatively new field and is quickly gaining momentum. Network security visualization allows the display and projection of the network or system data, in hope to efficiently monitor and protect the system from any intrusions or possible attacks. Intrusions and attacks are constantly continuing to increase in number, size, and complexity. Textually reading through log files or other textual sources is currently insufficient to secure a network or system. Using graphical visualization, security information is presented visually, and not only by text. Without ne
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Shirazi, Patrick. "Identifying Challenges in Cybersecurity Data Visualization Dashboards." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-80412.

Texto completo
Resumen
Nowadays, a massive amount of cybersecurity data-objects, such as security events, logs,messages, are flowing through different cybersecurity systems. With the enormous fastdevelopment of different cloud environments, big data, IoT, and so on, these amounts of data areincreasingly revolutionary. One of the challenges for different security actors, such as securityadmins, cybersecurity analysis, and network technicians, is how to utilize this amount of data inorder to reach meaningful insights, so they can be used further in diagnosis, validation, forensicand decision-making purposes. In order
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Musa, Shahrulniza. "Visualising network security attacks with multiple 3D visualisation and false alert classification." Thesis, Loughborough University, 2008. https://dspace.lboro.ac.uk/2134/14241.

Texto completo
Resumen
Increasing numbers of alerts produced by network intrusion detection systems (NIDS) have burdened the job of security analysts especially in identifying and responding to them. The tasks of exploring and analysing large quantities of communication network security data are also difficult. This thesis studied the application of visualisation in combination with alerts classifier to make the exploring and understanding of network security alerts data faster and easier. The prototype software, NSAViz, has been developed to visualise and to provide an intuitive presentation of the network security
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Wang, Hsiu-Chung. "Toward a Heuristic Model for Evaluating the Complexity of Computer Security Visualization Interface." Digital Archive @ GSU, 2006. http://digitalarchive.gsu.edu/cs_theses/35.

Texto completo
Resumen
Computer security visualization has gained much attention in the research community in the past few years. However, the advancement in security visualization research has been hampered by the lack of standardization in visualization design, centralized datasets, and evaluation methods. We propose a new heuristic model for evaluating the complexity of computer security visualizations. This complexity evaluation method is designed to evaluate the efficiency of performing visual search in security visualizations in terms of measuring critical memory capacity load needed to perform such tasks. Our
Los estilos APA, Harvard, Vancouver, ISO, etc.
Más fuentes

Libros sobre el tema "Visualization for computer security"

1

Goodall, John R., Gregory Conti, and Kwan-Liu Ma, eds. Visualization for Computer Security. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-85933-8.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Marty, Raffael. Applied security visualization. Addison-Wesley, 2009.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Applied security visualization. Addison-Wesley, 2008.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Security data visualization. No Starch Press, 2007.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

International Workshop on Visualization for Cyber Security. 6th International Workshop on Visualization for Cyber Security 2009: Atlantic City, New Jersey, USA, October 11, 2009 : proceedings. IEEE, 2009.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

David, Hutchison. Visualization for Computer Security: 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings. Springer-Verlag Berlin Heidelberg, 2008.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Association for Computing Machinery. Special Interest Group on Security, Audit, and Control. and ACM Conference on Computer and Communications Security (11th : 2004 : Washington, D.C.), eds. VizSEC/DMSEC '04: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, Washington, DC, USA, October 29, 2004, co-located with CCS 2004. ACM, 2004.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Buford, John F. Koegel. Cyber security, situation management, and impact assessment II and visual analytics for homeland defense and security II: 5 and 8-9 April 2010, Orlando, Florida, United States. SPIE, 2010.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Kim, Moon S. Defense and security 2008: Special sessions on food safety, visual analytics, resource restricted embedded and sensor networks, and 3D imaging and display : 17-18 March 2008, Orlando, Florida, USA. Edited by Society of Photo-optical Instrumentation Engineers. SPIE, 2008.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Hagen, Hans. Focus on Scientific Visualization. Springer Berlin Heidelberg, 1993.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Más fuentes

Capítulos de libros sobre el tema "Visualization for computer security"

1

Minarik, Pavel, and Tomas Dymacek. "NetFlow Data Visualization Based on Graphs." In Visualization for Computer Security. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-85933-8_14.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Jankun-Kelly, T. J., Josh Franck, David Wilson, Jeffery Carver, David Dampier, and J. Edward Swan. "Show Me How You See: Lessons from Studying Computer Forensics Experts for Visualization." In Visualization for Computer Security. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-85933-8_8.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Novikova, Evgenia, Mikhail Bestuzhev, and Igor Kotenko. "Anomaly Detection in the HVAC System Operation by a RadViz Based Visualization-Driven Approach." In Computer Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42048-2_26.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

de Camargo, Luiz F., Alessandro Moraes, Diego R. C. Dias, and José R. F. Brega. "Information Visualization Applied to Computer Network Security." In Computational Science and Its Applications – ICCSA 2020. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58802-1_4.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Kolomeec, Maxim, Gustavo Gonzalez-Granadillo, Elena Doynikova, Andrey Chechulin, Igor Kotenko, and Hervé Debar. "Choosing Models for Security Metrics Visualization." In Lecture Notes in Computer Science. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-65127-9_7.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Ishihara, Manabu, and Taiki Kanayama. "Visualization of Network Security Data by Haptic." In Lecture Notes in Computer Science. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-91467-1_7.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Hawthorne, Glen, Ying He, Leandros Maglaras, and Helge Janicke. "Security Visualization: Detecting Denial of Service." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52569-3_4.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Jin, Wenkui, Xurong Shan, and Ke Ma. "Research on Information Visualization Design for Public Health Security Emergencies." In Lecture Notes in Computer Science. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78468-3_22.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Hanauer, Tanja, and Wolfgang Hommel. "Enhancing Enterprise IT Security with a Visualization-Based Process Framework." In Communications in Computer and Information Science. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-4825-3_18.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Chen, Jie, and Yan Huang. "In Internet-Based Visualization System Study about Breakthrough Applet Security Restrictions." In Computer and Computing Technologies in Agriculture III. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12220-0_57.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Actas de conferencias sobre el tema "Visualization for computer security"

1

Beaver, Justin M., Chad A. Steed, Robert M. Patton, Xiaohui Cui, and Matthew Schultz. "Visualization techniques for computer network defense." In SPIE Defense, Security, and Sensing, edited by Edward M. Carapezza. SPIE, 2011. http://dx.doi.org/10.1117/12.883487.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Alsaleh, Mansour, David Barrera, and P. C. van Oorschot. "Improving Security Visualization with Exposure Map Filtering." In 2008 Annual Computer Security Applications Conference (ACSAC). IEEE, 2008. http://dx.doi.org/10.1109/acsac.2008.16.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

"IEEE Workshop on Visualization for Computer Security 2005 (VizSEC 05)." In IEEE Workshop on Visualization for Computer Security, 2005. (VizSEC 05). IEEE, 2005. http://dx.doi.org/10.1109/vizsec.2005.1532059.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Yang, Tingting, and Shuwen Jia. "Research on Network Security Visualization under Big Data Environment." In 2016 International Computer Symposium (ICS). IEEE, 2016. http://dx.doi.org/10.1109/ics.2016.0135.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Carr, Steve, and Jean Mayo. "SecureCvisual: Visualization and Analysis for C Code Security." In SIGCSE '20: The 51st ACM Technical Symposium on Computer Science Education. ACM, 2020. http://dx.doi.org/10.1145/3328778.3372540.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Yermalovich, Pavel. "Dashboard Visualization Techniques in Information Security." In 2020 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2020. http://dx.doi.org/10.1109/isncc49221.2020.9297291.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Zhongyang Kan, Changzhen Hu, Zhigang Wang, Guoqiang Wang, and Xiaolong Huang. "NetVis: A network security management visualization tool based on treemap." In 2010 2nd International Conference on Advanced Computer Control. IEEE, 2010. http://dx.doi.org/10.1109/icacc.2010.5487236.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Chaisorn, Lekha, Corey Manders, Janya Sainui, and Tian Shiang Kok. "Visualization and Security for Video Sharing and Transfer over Networks." In 2010 Second International Conference on Computer Modeling and Simulation (ICCMS). IEEE, 2010. http://dx.doi.org/10.1109/iccms.2010.497.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Almjawel, Aljoharah, Sahar Bayoumi, Dalal Alshehri, Soroor Alzahrani, and Munirah Alotaibi. "Sentiment Analysis and Visualization of Amazon Books' Reviews." In 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS). IEEE, 2019. http://dx.doi.org/10.1109/cais.2019.8769589.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

"A Visualization Method Based on Graph Database in Security Logs Analysis." In 2017 6th International Conference on Advanced Materials and Computer Science. Clausius Scientific Press Inc., 2017. http://dx.doi.org/10.23977/icamcs.2017.1012.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Informes sobre el tema "Visualization for computer security"

1

Swanson, Marianne, and Elizabeth B. Lennon. Computer security:. National Institute of Standards and Technology, 1991. http://dx.doi.org/10.6028/nist.ir.4545.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

SECRETARY OF THE AIR FORCE WASHINGTON DC. Computer Security Assistance Program. Defense Technical Information Center, 1997. http://dx.doi.org/10.21236/ada404996.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Todd, Mary Anne, and Constance Guitian. Computer security training guidelines. National Institute of Standards and Technology, 1989. http://dx.doi.org/10.6028/nist.sp.500-172.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Berg, Michael J. Indirection and computer security. Office of Scientific and Technical Information (OSTI), 2011. http://dx.doi.org/10.2172/1034885.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Faculjak, D. A. Implementing security measures for computer-based security systems. Office of Scientific and Technical Information (OSTI), 1989. http://dx.doi.org/10.2172/6137987.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

SECRETARY OF THE AIR FORCE WASHINGTON DC. Communications and Information: Computer Security. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada405011.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Bergendahl, T. J., K. S. Smith, and J. G. Sullivan. Computer Security Products Technology Overview. Defense Technical Information Center, 1988. http://dx.doi.org/10.21236/ada203261.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Guttman, Barbara, and Edward Roback. An introduction to computer security :. National Institute of Standards and Technology, 1995. http://dx.doi.org/10.6028/nist.sp.800-12.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Skandera, Mark, and Marianne Swanson. Computer security bulletin board system:. National Institute of Standards and Technology, 1991. http://dx.doi.org/10.6028/nist.ir.4667.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Skandera, Mark, and Marianne Swanson. Computer security bulletin board system:. National Institute of Standards and Technology, 1992. http://dx.doi.org/10.6028/nist.ir.4933.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!