Artículos de revistas sobre el tema "Visualization for computer security"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Visualization for computer security".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Ma, Kwan-Liu. "Visualization for security." ACM SIGGRAPH Computer Graphics 38, no. 4 (2004): 4–6. http://dx.doi.org/10.1145/1039140.1039146.
Texto completoYuan, Xiaohong, Percy Vega, Yaseen Qadah, Ricky Archer, Huiming Yu, and Jinsheng Xu. "Visualization Tools for Teaching Computer Security." ACM Transactions on Computing Education 9, no. 4 (2010): 1–28. http://dx.doi.org/10.1145/1656255.1656258.
Texto completoZhang, Yanping, Yang Xiao, Min Chen, Jingyuan Zhang, and Hongmei Deng. "A survey of security visualization for computer network logs." Security and Communication Networks 5, no. 4 (2011): 404–21. http://dx.doi.org/10.1002/sec.324.
Texto completoBarrera, David, and Paul C. van Oorschot. "Accommodating IPv6 Addresses in Security Visualization Tools." Information Visualization 10, no. 2 (2010): 107–16. http://dx.doi.org/10.1057/ivs.2010.9.
Texto completoLobachev, Oleg. "Direct visualization of cryptographic keys for enhanced security." Visual Computer 34, no. 12 (2017): 1749–59. http://dx.doi.org/10.1007/s00371-017-1466-6.
Texto completoConti, G., K. Abdullah, J. Grizzard, et al. "Countering security information overload through alert and packet visualization." IEEE Computer Graphics and Applications 26, no. 2 (2006): 60–70. http://dx.doi.org/10.1109/mcg.2006.30.
Texto completoTri Dang, Tran, and Tran Khanh Dang. "Visualization of web form submissions for security analysis." International Journal of Web Information Systems 9, no. 2 (2013): 165–80. http://dx.doi.org/10.1108/ijwis-12-2012-0036.
Texto completoGoodall, John R. "An Evaluation of Visual and Textual Network Analysis Tools." Information Visualization 10, no. 2 (2011): 145–57. http://dx.doi.org/10.1057/ivs.2011.2.
Texto completoJin Liu, Jing Sun, Zheng Q. Xu, and Lu Gao. "Security Web Release and Visualization of Remote Sensing Images." International Journal of Digital Content Technology and its Applications 4, no. 3 (2010): 146–53. http://dx.doi.org/10.4156/jdcta.vol4.issue3.15.
Texto completoNovikova, Evgenia Sergeevna, and Igor Vitalievich Kotenko. "Analysis of the Visualization Techniques used for Information Security in the Computer Networks." SPIIRAS Proceedings 4, no. 23 (2014): 7. http://dx.doi.org/10.15622/sp.23.1.
Texto completoKhanh Dang, Tran, and Tran Tri Dang. "A survey on security visualization techniques for web information systems." International Journal of Web Information Systems 9, no. 1 (2013): 6–31. http://dx.doi.org/10.1108/17440081311316361.
Texto completoXu, Ya Ning. "Research on Process Control of Human Resource Management Based on Visualization Technology." Applied Mechanics and Materials 687-691 (November 2014): 2258–62. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2258.
Texto completoОдиноков, С. Б., В. В. Колючкин, Д. В. Кузьмин та ін. "Метод персонализации фотополимерных защитных голограмм на основе записи скрытых кодированных цифровых изображений". Оптика и спектроскопия 129, № 4 (2021): 393. http://dx.doi.org/10.21883/os.2021.04.50765.299-20.
Texto completoYu, Xiaoying, and Qi Liao. "User password repetitive patterns analysis and visualization." Information & Computer Security 24, no. 1 (2016): 93–115. http://dx.doi.org/10.1108/ics-06-2015-0026.
Texto completoSonmez, Ferda Ozdemir, and Banu Gunel Kilic. "Holistic Web Application Security Visualization for Multi-Project and Multi-Phase Dynamic Application Security Test Results." IEEE Access 9 (2021): 25858–84. http://dx.doi.org/10.1109/access.2021.3057044.
Texto completoChang, Juan, Jian Hua Zhang, Dian Ji Zhang, and Zhi Gang Liu. "Research on Computer Information System of Disaster Warning Based on ANSYS and MATLAB." Applied Mechanics and Materials 484-485 (January 2014): 958–62. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.958.
Texto completoBai, Bing, Xue Jun Chen, En Qiang Zhu, Wan Xiao Xue, and Jie Yu. "Digital Urban Three-Dimensional Technique Base on OpenGL." Advanced Materials Research 726-731 (August 2013): 4568–71. http://dx.doi.org/10.4028/www.scientific.net/amr.726-731.4568.
Texto completoJang, Sejun, Shuyu Li, and Yunsick Sung. "FastText-Based Local Feature Visualization Algorithm for Merged Image-Based Malware Classification Framework for Cyber Security and Cyber Defense." Mathematics 8, no. 3 (2020): 460. http://dx.doi.org/10.3390/math8030460.
Texto completoWu, Lili, Ganesh K. Venayagamoorthy, and Jinfeng Gao. "Online Steady-State Security Awareness Using Cellular Computation Networks and Fuzzy Techniques." Energies 14, no. 1 (2020): 148. http://dx.doi.org/10.3390/en14010148.
Texto completoFu Lu, Liang, Jia Wan Zhang, Mao Lin Huang, and Lei Fu. "A new concentric-circle visualization of multi-dimensional data and its application in network security." Journal of Visual Languages & Computing 21, no. 4 (2010): 194–208. http://dx.doi.org/10.1016/j.jvlc.2010.05.002.
Texto completoDilla, William, Diane J. Janvrin, and Robyn Raschke. "Interactive Data Visualization: New Directions for Accounting Information Systems Research." Journal of Information Systems 24, no. 2 (2010): 1–37. http://dx.doi.org/10.2308/jis.2010.24.2.1.
Texto completoBenito-Santos, Alejandro, and Roberto Therón Sánchez. "Defragmenting Research Areas with Knowledge Visualization and Visual Text Analytics." Applied Sciences 10, no. 20 (2020): 7248. http://dx.doi.org/10.3390/app10207248.
Texto completoAbid, Adnan, Ansar Abbas, Adel Khelifi, Muhammad Shoaib Farooq, Razi Iqbal, and Uzma Farooq. "An architectural framework for information integration using machine learning approaches for smart city security profiling." International Journal of Distributed Sensor Networks 16, no. 10 (2020): 155014772096547. http://dx.doi.org/10.1177/1550147720965473.
Texto completoSharafaldin, Iman, Arash Habibi Lashkari, and Ali A. Ghorbani. "An evaluation framework for network security visualizations." Computers & Security 84 (July 2019): 70–92. http://dx.doi.org/10.1016/j.cose.2019.03.005.
Texto completoLiu, Zhaoli, Xiaohong Guan, Shancang Li, Tao Qin, and Chao He. "Behavior Rhythm: A New Model for Behavior Visualization and Its Application in System Security Management." IEEE Access 6 (2018): 73940–51. http://dx.doi.org/10.1109/access.2018.2882812.
Texto completoMeng, Linhao, Yating Wei, Rusheng Pan, Shuyue Zhou, Jianwei Zhang, and Wei Chen. "VADAF: Visualization for Abnormal Client Detection and Analysis in Federated Learning." ACM Transactions on Interactive Intelligent Systems 11, no. 3-4 (2021): 1–23. http://dx.doi.org/10.1145/3426866.
Texto completode Paula, Rogério, Xianghua Ding, Paul Dourish, et al. "In the eye of the beholder: A visualization-based approach to information system security." International Journal of Human-Computer Studies 63, no. 1-2 (2005): 5–24. http://dx.doi.org/10.1016/j.ijhcs.2005.04.021.
Texto completoGolubev, Alexandr, Peter Bogatencov, and Grigore Secrieru. "DICOM data processing optimization in medical information systems." Scalable Computing: Practice and Experience 19, no. 2 (2018): 189–201. http://dx.doi.org/10.12694/scpe.v19i2.1399.
Texto completoNovikova, Evgenia, Igor Kotenko, and Ivan Murenin. "The Visual Analytics Approach for Analyzing Trajectories of Critical Infrastructure Employers." Energies 13, no. 15 (2020): 3936. http://dx.doi.org/10.3390/en13153936.
Texto completoSi, Nianwen, Wenlin Zhang, Dan Qu, Xiangyang Luo, Heyu Chang, and Tong Niu. "Spatial-Channel Attention-Based Class Activation Mapping for Interpreting CNN-Based Image Classification Models." Security and Communication Networks 2021 (May 31, 2021): 1–13. http://dx.doi.org/10.1155/2021/6682293.
Texto completoWang, Weichao, and Aidong Lu. "Interactive Wormhole Detection and Evaluation." Information Visualization 6, no. 1 (2007): 3–17. http://dx.doi.org/10.1057/palgrave.ivs.9500144.
Texto completoFigueiredo, Ciro, and Caroline Mota. "Learning Preferences in a Spatial Multiple Criteria Decision Approach: An Application in Public Security Planning." International Journal of Information Technology & Decision Making 18, no. 04 (2019): 1403–32. http://dx.doi.org/10.1142/s0219622019500251.
Texto completoV, Dr Suma. "Automatic Spotting of Sceptical Activity with Visualization Using Elastic Cluster for Network Traffic in Educational Campus." Journal of Ubiquitous Computing and Communication Technologies 2, no. 2 (2020): 88–97. http://dx.doi.org/10.36548/jucct.2020.2.004.
Texto completoBaciu, George, Chenhui Li, Yunzhe Wang, and Xiujun Zhang. "Cloudet." International Journal of Cognitive Informatics and Natural Intelligence 10, no. 1 (2016): 12–31. http://dx.doi.org/10.4018/ijcini.2016010102.
Texto completoHingant, Javier, Marcelo Zambrano, Francisco J. Pérez, Israel Pérez, and Manuel Esteve. "HYBINT: A Hybrid Intelligence System for Critical Infrastructures Protection." Security and Communication Networks 2018 (August 27, 2018): 1–13. http://dx.doi.org/10.1155/2018/5625860.
Texto completoBayrak, Tuncay. "Identifying Technical Requirements for a Mobile Business Analytics Application." International Journal of Business Analytics 8, no. 4 (2021): 91–103. http://dx.doi.org/10.4018/ijban.2021100106.
Texto completoFan, Youping, Xin Li, and Peng Zhang. "Integrated Approach for Online Dynamic Security Assessment With Credibility and Visualization Based on Exploring Connotative Associations in Massive Data." IEEE Access 5 (2017): 16555–67. http://dx.doi.org/10.1109/access.2017.2739818.
Texto completoKagawa, Takuhiro, Sachio Saiki, and Masahide Nakamura. "Analyzing street crimes in Kobe city using PRISM." International Journal of Web Information Systems 15, no. 2 (2019): 183–200. http://dx.doi.org/10.1108/ijwis-04-2018-0032.
Texto completoOssio, Raul, O. Isaac Garcia-Salinas, Diego Said Anaya-Mancilla, et al. "VCF/Plotein: visualization and prioritization of genomic variants from human exome sequencing projects." Bioinformatics 35, no. 22 (2019): 4803–5. http://dx.doi.org/10.1093/bioinformatics/btz458.
Texto completoChen, Victor Y., Ahmad M. Razip, Sungahn Ko, Cheryl Z. Qian, and David S. Ebert. "Multi-aspect visual analytics on large-scale high-dimensional cyber security data." Information Visualization 14, no. 1 (2013): 62–75. http://dx.doi.org/10.1177/1473871613488573.
Texto completoDihl, Leandro, Leandro Cruz, and Nuno Gonçalves. "Card3DFace—An Application to Enhance 3D Visual Validation in ID Cards and Travel Documents." Applied Sciences 11, no. 19 (2021): 8821. http://dx.doi.org/10.3390/app11198821.
Texto completoWanner, Franz, Wolfgang Jentner, Tobias Schreck, Andreas Stoffel, Lyubka Sharalieva, and Daniel A. Keim. "Integrated visual analysis of patterns in time series and text data - Workflow and application to financial data analysis." Information Visualization 15, no. 1 (2015): 75–90. http://dx.doi.org/10.1177/1473871615576925.
Texto completoRobertson, George, David Ebert, Stephen Eick, Daniel Keim, and Ken Joy. "Scale and Complexity in Visual Analytics." Information Visualization 8, no. 4 (2009): 247–53. http://dx.doi.org/10.1057/ivs.2009.23.
Texto completoObagbuwa, Ibidun Christiana, and Ademola P. Abidoye. "South Africa Crime Visualization, Trends Analysis, and Prediction Using Machine Learning Linear Regression Technique." Applied Computational Intelligence and Soft Computing 2021 (June 8, 2021): 1–14. http://dx.doi.org/10.1155/2021/5537902.
Texto completoCook, Kristin, Georges Grinstein, and Mark Whiting. "The VAST Challenge: history, scope, and outcomes: An introduction to the Special Issue." Information Visualization 13, no. 4 (2013): 301–12. http://dx.doi.org/10.1177/1473871613490678.
Texto completoHuang, Ruhua, Chunying Wang, Xiaoyu Zhang, Dan Wu, and Qingwen Xie. "Design, develop and evaluate an open government data platform: a user-centred approach." Electronic Library 37, no. 3 (2019): 550–62. http://dx.doi.org/10.1108/el-02-2019-0037.
Texto completoFischer, Fabian, Johannes Fuchs, Florian Mansmann, and Daniel A. Keim. "BANKSAFE: Visual analytics for big data in large-scale computer networks." Information Visualization 14, no. 1 (2013): 51–61. http://dx.doi.org/10.1177/1473871613488572.
Texto completoSchweitzer, Dino, Jeff Boleng, Colin Hughes, and Louis Murphy. "Visualizing Keyboard Pattern Passwords." Information Visualization 10, no. 2 (2010): 127–33. http://dx.doi.org/10.1057/ivs.2010.12.
Texto completoLakhno, Valeriy, Volodimir Malyukov, Berik Akhmetov, Dmytro Kasatkin, and Liubov Plyska. "Development of a model for choosing strategies for investing in information security." Eastern-European Journal of Enterprise Technologies 2, no. 3 (110) (2021): 43–51. http://dx.doi.org/10.15587/1729-4061.2021.228313.
Texto completoKwon, Hyun, Hyunsoo Yoon, and Ki-Woong Park. "Selective Poisoning Attack on Deep Neural Networks †." Symmetry 11, no. 7 (2019): 892. http://dx.doi.org/10.3390/sym11070892.
Texto completo