NAVSEC a recommender system for 3D network security visualizations

T Nunnally, K Abdullah, AS Uluagac… - Proceedings of the …, 2013 - dl.acm.org
As network attacks increase in complexity, the ability to quickly analyze security data and
mitigate the effect of these attacks becomes a difficult problem. To alleviate these …

P3D: A parallel 3D coordinate visualization for advanced network scans

T Nunnally, P Chi, K Abdullah… - 2013 IEEE …, 2013 - ieeexplore.ieee.org
As network attacks increase in complexity, network administrators will continue to struggle
with analyzing security data immediately and efficiently. To alleviate these challenges …

7 key challenges for visualization in cyber network defense

DM Best, A Endert, D Kidwell - Proceedings of the Eleventh Workshop …, 2014 - dl.acm.org
What does it take to be a successful visualization in cyber security? This question has been
explored for some time, resulting in many potential solutions being developed and offered to …

A survey of visualization systems for network security

H Shiravi, A Shiravi, AA Ghorbani - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Security Visualization is a very young term. It expresses the idea that common visualization
techniques have been designed for use cases that are not supportive of security-related …

[图书][B] Applying information visualization to computer security applications

RB Whitaker - 2010 - search.proquest.com
This thesis presents two phases of research in applying visualization to network security
challenges. The first phase included discovering the most useful and powerful features in …

Flexible web visualization for alert-based network security analytics

L Hao, CG Healey, SE Hutchinson - Proceedings of the Tenth Workshop …, 2013 - dl.acm.org
This paper describes a web-based visualization system designed for network security
analysts at the US Army Research Laboratory (ARL). Our goal is to provide visual support to …

An evaluation framework for network security visualizations

I Sharafaldin, AH Lashkari, AA Ghorbani - Computers & Security, 2019 - Elsevier
Visualization helps to comprehend and analyze large amounts of data, a fundamental
necessity for network security due to the large volume of audits traces produced each day. In …

Cover-VT: Converged security visualization tool

W Urbanski, M Dunlop, R Marchany… - 12th IFIP/IEEE …, 2011 - ieeexplore.ieee.org
The amount of data that floods today's networks is well beyond what security analysts can
manage by textual means alone. In an effort to solve this problem, researchers have …

MalwareVis: entity-based visualization of malware network traces

W Zhuo, Y Nadjin - Proceedings of the ninth international symposium on …, 2012 - dl.acm.org
This paper presents MalwareVis, a utility that provides security researchers a method to
browse, filter, view and compare malware network traces as entities. Specifically, we …

[PDF][PDF] Network eye: End-to-end computer security visualization

G Fink, R Ball, N Jawalkar, C North… - … for consideration at ACM …, 2004 - academia.edu
Visibility is crucial to managing and securing today's computers and networks. Visualization
tools are a means to provide visibility into the invisible world of network computing. Many …