An evaluation framework for network security visualizations

I Sharafaldin, AH Lashkari, AA Ghorbani - Computers & Security, 2019 - Elsevier
Visualization helps to comprehend and analyze large amounts of data, a fundamental
necessity for network security due to the large volume of audits traces produced each day. In …

Visualization tools for network security

AE Attipoe, J Yan, C Turner, D Richards - Electronic Imaging, 2016 - library.imaging.org
Network security visualization tool plays an important role in the network security filed. It's
considered the first line of defense because it provides security analysts with visualized …

A survey, taxonomy, and analysis of network security visualization techniques

RR Kasemsri - 2006 - scholarworks.gsu.edu
Network security visualization is a relatively new field and is quickly gaining momentum.
Network security visualization allows the display and projection of the network or system …

A survey on network security data visualization

Y Zhao, X Fan, F Zhou, F Wang, J Zhang - Journal of Computer-Aided …, 2014 - jcad.cn
As a young community of network security research, visualization for network security
focuses on taking advantage of the power of the human perceptual and cognitive processes …

A survey of visualization systems for network security

H Shiravi, A Shiravi, AA Ghorbani - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Security Visualization is a very young term. It expresses the idea that common visualization
techniques have been designed for use cases that are not supportive of security-related …

The future of security visualization: Lessons from network visualization

L Harrison, A Lu - IEEE Network, 2012 - ieeexplore.ieee.org
Approaches in security visualization have made significant progress in addressing
challenges in the ever changing landscape of network security. However, many approaches …

[图书][B] Applied security visualization

R Marty - 2008 - dl.acm.org
APPLIED SECURITY VISUALIZATION Collecting log data is one thing, having relevant
information is something else. The art to transform all kinds of log data into meaningful …

Evaluating visualization approaches to detect abnormal activities in network traffic data

SY Ji, BK Jeong, DH Jeong - International Journal of Information Security, 2021 - Springer
Designing innovative approaches to detect intrusive network activities is considered as one
of the most significant research topics in network security. Various computational methods …

[图书][B] Security data visualization: graphical techniques for network analysis

G Conti - 2007 - books.google.com
Information overload. If you're responsible for maintaining your network's security, you're
living with it every day. Logs, alerts, packet captures, and even binary files take time and …

Analysis of visualization systems for cyber security

H Zhao, W Tang, X Zou, Y Wang, Y Zu - Recent Developments in Intelligent …, 2019 - Springer
Cyber security visualization is becoming a hot research field. Visualization and interactive
analysis can greatly help network managers and analysts monitor network, detect …