Analysis of Network Attacks and Security Events using Modern Data Visualization Techniques

PM Pereira - 2015 - ubibliorum.ubi.pt
Modern society is nowadays evolving at a pace that has never been witnessed before.
Regarding this evolution, it can be also observed that the technological evolution has been …

[PDF][PDF] D5. 1–State of the Art on Software Quality Visualization

S Köken - itea4.org
Visualizations are key to understanding complexities driven by loads of data generated by
modern software-based systems. Modern ways to develop software-based systems tend to …

Secure CodeCity A Framework For Security Vulnerability Visualization

A Abeysinghe, MAS Shalika, MSN Ahamed… - 2021 - dl.ucsc.cmb.ac.lk
The conventional practice in the software industry towards the resolution of security issues,
is to discover those issues during the testing phase of the Software Development Life Cycle …

Visualization of unit and selective regression software tests

T Tamisier, P Karski, F Feltz - … , Alcudia, Mallorca, Spain, September 22-25 …, 2013 - Springer
We present a visualization platform for managing software tests. First, the platform provides
the developer with all useful information about code complexity, coverage and current test …

Visualization of cybersecurity data in order to detect cyber attacks

SS Nainar - 2021 - search.proquest.com
One of the main domains in security is cybersecurity. With the increasing usage of the
internet daily, network and computing have become an important target for hackers. Most of …

New Testing Techniques to Evaluate the Quality of Information Visualization Implementations

ML Larrea, DK Urribarri, ML Ganuza - LACCEI, 2023 - 3.134.240.183
The use of information visualization has significantly grown thanks to Industry 4.0, and now
we can see its usage in more critical sectors. In this context, the implementation of such …

Visualizing Security Vulnerability Evolution of Software Systems

NN Sinhabahu - 2021 - dl.ucsc.cmb.ac.lk
The analysis of large-scale software and finding security vulnerabilities while its evolving is
difficult without using supplementary tools, because of the size and complexity of today's …

Software evolution visualization

SL Voinea - 2007 - research.tue.nl
Software has today a large penetration in all infrastructure levels of the society. This
penetration took place rapidly in the last two decades and continues to increase. In the same …

[PDF][PDF] Towards classifying and selecting appropriate security visualization techniques

D Barrera - 2009 - repository.library.carleton.ca
Visualization of network security events has become an important method for detecting,
responding to, and resolving security incidents. While there are many security visualization …

A synergy between static and dynamic analysis for the detection of software security vulnerabilities

A Hanna, HZ Ling, XC Yang, M Debbabi - … 1-6, 2009, Proceedings, Part II, 2009 - Springer
The main contribution of this paper is a framework for security testing. The key components
of this framework are twofold: First, a static analyzer that automatically identifies suspicious …