Literatura académica sobre el tema "Visualization for computer security"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Visualization for computer security".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Visualization for computer security"
Ma, Kwan-Liu. "Visualization for security." ACM SIGGRAPH Computer Graphics 38, no. 4 (2004): 4–6. http://dx.doi.org/10.1145/1039140.1039146.
Texto completoYuan, Xiaohong, Percy Vega, Yaseen Qadah, Ricky Archer, Huiming Yu, and Jinsheng Xu. "Visualization Tools for Teaching Computer Security." ACM Transactions on Computing Education 9, no. 4 (2010): 1–28. http://dx.doi.org/10.1145/1656255.1656258.
Texto completoZhang, Yanping, Yang Xiao, Min Chen, Jingyuan Zhang, and Hongmei Deng. "A survey of security visualization for computer network logs." Security and Communication Networks 5, no. 4 (2011): 404–21. http://dx.doi.org/10.1002/sec.324.
Texto completoBarrera, David, and Paul C. van Oorschot. "Accommodating IPv6 Addresses in Security Visualization Tools." Information Visualization 10, no. 2 (2010): 107–16. http://dx.doi.org/10.1057/ivs.2010.9.
Texto completoLobachev, Oleg. "Direct visualization of cryptographic keys for enhanced security." Visual Computer 34, no. 12 (2017): 1749–59. http://dx.doi.org/10.1007/s00371-017-1466-6.
Texto completoConti, G., K. Abdullah, J. Grizzard, et al. "Countering security information overload through alert and packet visualization." IEEE Computer Graphics and Applications 26, no. 2 (2006): 60–70. http://dx.doi.org/10.1109/mcg.2006.30.
Texto completoTri Dang, Tran, and Tran Khanh Dang. "Visualization of web form submissions for security analysis." International Journal of Web Information Systems 9, no. 2 (2013): 165–80. http://dx.doi.org/10.1108/ijwis-12-2012-0036.
Texto completoGoodall, John R. "An Evaluation of Visual and Textual Network Analysis Tools." Information Visualization 10, no. 2 (2011): 145–57. http://dx.doi.org/10.1057/ivs.2011.2.
Texto completoJin Liu, Jing Sun, Zheng Q. Xu, and Lu Gao. "Security Web Release and Visualization of Remote Sensing Images." International Journal of Digital Content Technology and its Applications 4, no. 3 (2010): 146–53. http://dx.doi.org/10.4156/jdcta.vol4.issue3.15.
Texto completoNovikova, Evgenia Sergeevna, and Igor Vitalievich Kotenko. "Analysis of the Visualization Techniques used for Information Security in the Computer Networks." SPIIRAS Proceedings 4, no. 23 (2014): 7. http://dx.doi.org/10.15622/sp.23.1.
Texto completoTesis sobre el tema "Visualization for computer security"
Teoh, Soon Tee. "Interactive visualization techniques for computer network security /." For electronic version search Digital dissertations database. Restricted to UC campuses. Access is free to UC campus dissertations, 2004. http://uclibs.org/PID/11984.
Texto completoWhitaker, Robert Bruce. "Applying Information Visualization to Computer Security Applications." DigitalCommons@USU, 2010. https://digitalcommons.usu.edu/etd/636.
Texto completoLuse, Andrew William. "Exploring utilization of visualization for computer and network security." [Ames, Iowa : Iowa State University], 2009.
Buscar texto completoAbdullah, Kulsoom B. "Scaling and Visualizing Network Data to Facilitate in Intrusion Detection Tasks." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/10509.
Texto completoNunnally, Troy J. "Advanced visualizations for network security." Diss., Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/52993.
Texto completoFreet, David Nathan. "A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency." Thesis, Indiana State University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10261868.
Texto completoKasemsri, Rawiroj Robert. "A Survey, Taxonomy, and Analysis of Network Security Visualization Techniques." Digital Archive @ GSU, 2006. http://digitalarchive.gsu.edu/cs_theses/17.
Texto completoShirazi, Patrick. "Identifying Challenges in Cybersecurity Data Visualization Dashboards." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-80412.
Texto completoMusa, Shahrulniza. "Visualising network security attacks with multiple 3D visualisation and false alert classification." Thesis, Loughborough University, 2008. https://dspace.lboro.ac.uk/2134/14241.
Texto completoWang, Hsiu-Chung. "Toward a Heuristic Model for Evaluating the Complexity of Computer Security Visualization Interface." Digital Archive @ GSU, 2006. http://digitalarchive.gsu.edu/cs_theses/35.
Texto completoLibros sobre el tema "Visualization for computer security"
Goodall, John R., Gregory Conti, and Kwan-Liu Ma, eds. Visualization for Computer Security. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-85933-8.
Texto completoInternational Workshop on Visualization for Cyber Security. 6th International Workshop on Visualization for Cyber Security 2009: Atlantic City, New Jersey, USA, October 11, 2009 : proceedings. IEEE, 2009.
Buscar texto completoDavid, Hutchison. Visualization for Computer Security: 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings. Springer-Verlag Berlin Heidelberg, 2008.
Buscar texto completoAssociation for Computing Machinery. Special Interest Group on Security, Audit, and Control. and ACM Conference on Computer and Communications Security (11th : 2004 : Washington, D.C.), eds. VizSEC/DMSEC '04: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, Washington, DC, USA, October 29, 2004, co-located with CCS 2004. ACM, 2004.
Buscar texto completoBuford, John F. Koegel. Cyber security, situation management, and impact assessment II and visual analytics for homeland defense and security II: 5 and 8-9 April 2010, Orlando, Florida, United States. SPIE, 2010.
Buscar texto completoKim, Moon S. Defense and security 2008: Special sessions on food safety, visual analytics, resource restricted embedded and sensor networks, and 3D imaging and display : 17-18 March 2008, Orlando, Florida, USA. Edited by Society of Photo-optical Instrumentation Engineers. SPIE, 2008.
Buscar texto completoHagen, Hans. Focus on Scientific Visualization. Springer Berlin Heidelberg, 1993.
Buscar texto completoCapítulos de libros sobre el tema "Visualization for computer security"
Minarik, Pavel, and Tomas Dymacek. "NetFlow Data Visualization Based on Graphs." In Visualization for Computer Security. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-85933-8_14.
Texto completoJankun-Kelly, T. J., Josh Franck, David Wilson, Jeffery Carver, David Dampier, and J. Edward Swan. "Show Me How You See: Lessons from Studying Computer Forensics Experts for Visualization." In Visualization for Computer Security. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-85933-8_8.
Texto completoNovikova, Evgenia, Mikhail Bestuzhev, and Igor Kotenko. "Anomaly Detection in the HVAC System Operation by a RadViz Based Visualization-Driven Approach." In Computer Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42048-2_26.
Texto completode Camargo, Luiz F., Alessandro Moraes, Diego R. C. Dias, and José R. F. Brega. "Information Visualization Applied to Computer Network Security." In Computational Science and Its Applications – ICCSA 2020. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58802-1_4.
Texto completoKolomeec, Maxim, Gustavo Gonzalez-Granadillo, Elena Doynikova, Andrey Chechulin, Igor Kotenko, and Hervé Debar. "Choosing Models for Security Metrics Visualization." In Lecture Notes in Computer Science. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-65127-9_7.
Texto completoIshihara, Manabu, and Taiki Kanayama. "Visualization of Network Security Data by Haptic." In Lecture Notes in Computer Science. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-91467-1_7.
Texto completoHawthorne, Glen, Ying He, Leandros Maglaras, and Helge Janicke. "Security Visualization: Detecting Denial of Service." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52569-3_4.
Texto completoJin, Wenkui, Xurong Shan, and Ke Ma. "Research on Information Visualization Design for Public Health Security Emergencies." In Lecture Notes in Computer Science. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78468-3_22.
Texto completoHanauer, Tanja, and Wolfgang Hommel. "Enhancing Enterprise IT Security with a Visualization-Based Process Framework." In Communications in Computer and Information Science. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-4825-3_18.
Texto completoChen, Jie, and Yan Huang. "In Internet-Based Visualization System Study about Breakthrough Applet Security Restrictions." In Computer and Computing Technologies in Agriculture III. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12220-0_57.
Texto completoActas de conferencias sobre el tema "Visualization for computer security"
Beaver, Justin M., Chad A. Steed, Robert M. Patton, Xiaohui Cui, and Matthew Schultz. "Visualization techniques for computer network defense." In SPIE Defense, Security, and Sensing, edited by Edward M. Carapezza. SPIE, 2011. http://dx.doi.org/10.1117/12.883487.
Texto completoAlsaleh, Mansour, David Barrera, and P. C. van Oorschot. "Improving Security Visualization with Exposure Map Filtering." In 2008 Annual Computer Security Applications Conference (ACSAC). IEEE, 2008. http://dx.doi.org/10.1109/acsac.2008.16.
Texto completo"IEEE Workshop on Visualization for Computer Security 2005 (VizSEC 05)." In IEEE Workshop on Visualization for Computer Security, 2005. (VizSEC 05). IEEE, 2005. http://dx.doi.org/10.1109/vizsec.2005.1532059.
Texto completoYang, Tingting, and Shuwen Jia. "Research on Network Security Visualization under Big Data Environment." In 2016 International Computer Symposium (ICS). IEEE, 2016. http://dx.doi.org/10.1109/ics.2016.0135.
Texto completoCarr, Steve, and Jean Mayo. "SecureCvisual: Visualization and Analysis for C Code Security." In SIGCSE '20: The 51st ACM Technical Symposium on Computer Science Education. ACM, 2020. http://dx.doi.org/10.1145/3328778.3372540.
Texto completoYermalovich, Pavel. "Dashboard Visualization Techniques in Information Security." In 2020 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2020. http://dx.doi.org/10.1109/isncc49221.2020.9297291.
Texto completoZhongyang Kan, Changzhen Hu, Zhigang Wang, Guoqiang Wang, and Xiaolong Huang. "NetVis: A network security management visualization tool based on treemap." In 2010 2nd International Conference on Advanced Computer Control. IEEE, 2010. http://dx.doi.org/10.1109/icacc.2010.5487236.
Texto completoChaisorn, Lekha, Corey Manders, Janya Sainui, and Tian Shiang Kok. "Visualization and Security for Video Sharing and Transfer over Networks." In 2010 Second International Conference on Computer Modeling and Simulation (ICCMS). IEEE, 2010. http://dx.doi.org/10.1109/iccms.2010.497.
Texto completoAlmjawel, Aljoharah, Sahar Bayoumi, Dalal Alshehri, Soroor Alzahrani, and Munirah Alotaibi. "Sentiment Analysis and Visualization of Amazon Books' Reviews." In 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS). IEEE, 2019. http://dx.doi.org/10.1109/cais.2019.8769589.
Texto completo"A Visualization Method Based on Graph Database in Security Logs Analysis." In 2017 6th International Conference on Advanced Materials and Computer Science. Clausius Scientific Press Inc., 2017. http://dx.doi.org/10.23977/icamcs.2017.1012.
Texto completoInformes sobre el tema "Visualization for computer security"
Swanson, Marianne, and Elizabeth B. Lennon. Computer security:. National Institute of Standards and Technology, 1991. http://dx.doi.org/10.6028/nist.ir.4545.
Texto completoSECRETARY OF THE AIR FORCE WASHINGTON DC. Computer Security Assistance Program. Defense Technical Information Center, 1997. http://dx.doi.org/10.21236/ada404996.
Texto completoTodd, Mary Anne, and Constance Guitian. Computer security training guidelines. National Institute of Standards and Technology, 1989. http://dx.doi.org/10.6028/nist.sp.500-172.
Texto completoBerg, Michael J. Indirection and computer security. Office of Scientific and Technical Information (OSTI), 2011. http://dx.doi.org/10.2172/1034885.
Texto completoFaculjak, D. A. Implementing security measures for computer-based security systems. Office of Scientific and Technical Information (OSTI), 1989. http://dx.doi.org/10.2172/6137987.
Texto completoSECRETARY OF THE AIR FORCE WASHINGTON DC. Communications and Information: Computer Security. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada405011.
Texto completoBergendahl, T. J., K. S. Smith, and J. G. Sullivan. Computer Security Products Technology Overview. Defense Technical Information Center, 1988. http://dx.doi.org/10.21236/ada203261.
Texto completoGuttman, Barbara, and Edward Roback. An introduction to computer security :. National Institute of Standards and Technology, 1995. http://dx.doi.org/10.6028/nist.sp.800-12.
Texto completoSkandera, Mark, and Marianne Swanson. Computer security bulletin board system:. National Institute of Standards and Technology, 1991. http://dx.doi.org/10.6028/nist.ir.4667.
Texto completoSkandera, Mark, and Marianne Swanson. Computer security bulletin board system:. National Institute of Standards and Technology, 1992. http://dx.doi.org/10.6028/nist.ir.4933.
Texto completo