A bibliometric analysis and visualization of blockchain

YM Guo, ZL Huang, J Guo, XR Guo, H Li, MY Liu… - Future Generation …, 2021 - Elsevier
… Blockchain is a foremost tool to deal with all kinds of problems, including security,
transportation, logistics, finance, and so on. Globally, the importance, security, and worldwide …

[PDF][PDF] Knowledge extraction and data visualization: a proposed framework for secure decision making using data mining

HN Alshareef, A Majrashi… - … Journal of Advanced …, 2021 - pdfs.semanticscholar.org
… knowledge extraction and visualization but also considers the security of the … media
applications, websites, emails, and different types of documents [1]. Therefore, traditional security

Security in process: Visually supported triage analysis in industrial process data

AP Lohfink, SDD Anton, HD Schotten… - … on visualization and …, 2020 - ieeexplore.ieee.org
… We present a tailored visualization system that utilizes inherent … into the data and support
triage analysis by laymen and experts. … for security visualization experts as well as for laymen. …

A survey on information visualization: recent advances and challenges

S Liu, W Cui, Y Wu, M Liu - The Visual Computer, 2014 - Springer
visualization [24], or visualization of network security events [124]. In this paper, we have
conducted a systematic analysis … research trends and mainstream visualization work, along with …

[PDF][PDF] Towards classifying and selecting appropriate security visualization techniques

D Barrera - 2009 - repository.library.carleton.ca
… been no prior work in classifying visualization techniques for network security. We present
an up-to-date classification of network security visualization techniques grouped by the type of …

A survey of network anomaly visualization

T Zhang, X Wang, Z Li, F Guo, Y Ma… - Science China Information …, 2017 - Springer
… network security analysis and information visualization and summarize the state-of-the-art
network security visualization… The tasks of visualization analysis, which includes detection and …

Cyberseer: 3d audio-visual immersion for network security and management

C Papadopoulos, C Kyriakakis, A Sawchuk… - … on Visualization and …, 2004 - dl.acm.org
… Finally, many applications are inherently periodic, such as web requests by users, or
continuous media applications such as audio and video. Spectral analysis may detect problems …

Information security measurement infrastructure for KPI visualization

K Hajdarevic, C Pattinson, K Kozaric… - 2012 Proceedings of …, 2012 - ieeexplore.ieee.org
… as result of removable media usage, Internet site browsing etc. General security incidents
other … purposes was used ARIS MashZone software [10] able to read data and visualized them. …

A review of enterprise social media: visualization of landscape and evolution

Y Li, S Shi, Y Wu, Y Chen - Internet Research, 2021 - emerald.com
… ESM research by carrying out a visualized bibliometric analysis to present the current
research development, hot topics and future trends. Bibliometric analysis will add value to the …

[PDF][PDF] Security Visualization on Big Data

W Ahmed, MU Hashmi - Journal of Independent Studies and …, 2013 - jisr.szabist.edu.pk
… impossible for comprehension if visualized manually. Therefore, we need some visualization
technology that can help security professionals to manipulate, analyze and finally devise …