The matter of listening and aesthetics is a tension at the heart of sonification. This chapter proposes that adopting an ecological approach based upon Eric Clarke's use of the subject …
L Axon, J Nurse - International Journal on Advances in Security, 2017 - cs.ox.ac.uk
Sonification systems, in which data are represented through sound, have the potential to be useful in a number of network-security monitoring applications in Security Operations …
Sonification as a means for exploring and analysing data is an established research domain in the field of Auditory Displays. Since 1992, the International Community for Auditory …
Communication networks involve the transmission and reception of large volumes of data. Research indicates that network traffic volumes will continue to increase. These traffic …
M Debashi, P Vickers - IEEE Access, 2018 - ieeexplore.ieee.org
Today's computer networks are under increasing threat from malicious activity. Botnets (networks of remotely controlled computers, or “bots”) operate in such a way that their activity …
For server and network administrators, it is a challenge to keep an overview of their systems to detect potential intrusions and security risks in real-time as well as in retrospect. Most …
Abstract In Security Operations Centres (SOCs), computer networks are generally monitored using a combination of anomaly detection techniques, Intrusion Detection Systems (IDS) …
M Du, JK Chou, C Ma… - 2018 IEEE Pacific …, 2018 - ieeexplore.ieee.org
Studies on augmenting visualization with sound are typically based on the assumption that sound can be complementary and assist in data analysis tasks. While sound promotes a …
S Mori, M Maezawa, N Ienaga… - 2016 IEEE international …, 2016 - ieeexplore.ieee.org
Instructor's perspective videos are useful for presenting intuitive visual instructions for trainees in medical and industrial settings. In such videos, the instructor's arms often obstruct …