Sonification of network traffic flow for monitoring and situational awareness

M Debashi, P Vickers - PloS one, 2018 - journals.plos.org
Maintaining situational awareness of what is happening within a computer network is
challenging, not only because the behaviour happens within machines, but also because …

Aesthetics of sonification: Taking the subject-position

P Vickers, B Hogg, D Worrall - Body, sound and space in music …, 2017 - taylorfrancis.com
The matter of listening and aesthetics is a tension at the heart of sonification. This chapter
proposes that adopting an ecological approach based upon Eric Clarke's use of the subject …

A Formalised Approach to Designing Sonification Systems for Network− Security Monitoring

L Axon, J Nurse - International Journal on Advances in Security, 2017 - cs.ox.ac.uk
Sonification systems, in which data are represented through sound, have the potential to be
useful in a number of network-security monitoring applications in Security Operations …

[PDF][PDF] Sonification first: the role of icad in the advancement of sonification-related research

A Andreopoulou, V Goudarzi - Proceedings of the 26th …, 2021 - researchgate.net
Sonification as a means for exploring and analysing data is an established research domain
in the field of Auditory Displays. Since 1992, the International Community for Auditory …

Sonification of a network's self-organized criticality for real-time situational awareness

P Vickers, C Laing, T Fairfax - Displays, 2017 - Elsevier
Communication networks involve the transmission and reception of large volumes of data.
Research indicates that network traffic volumes will continue to increase. These traffic …

Sonification of network traffic for detecting and learning about botnet behavior

M Debashi, P Vickers - IEEE Access, 2018 - ieeexplore.ieee.org
Today's computer networks are under increasing threat from malicious activity. Botnets
(networks of remotely controlled computers, or “bots”) operate in such a way that their activity …

Server sounds and network noises

T Hildebrandt, S Rinderle-Ma - 2015 6th IEEE international …, 2015 - ieeexplore.ieee.org
For server and network administrators, it is a challenge to keep an overview of their systems
to detect potential intrusions and security risks in real-time as well as in retrospect. Most …

Reflecting on the use of sonification for network monitoring

L Axon, S Creese, M Goldsmith, J Nurse - 2016 - cs.ox.ac.uk
Abstract In Security Operations Centres (SOCs), computer networks are generally monitored
using a combination of anomaly detection techniques, Intrusion Detection Systems (IDS) …

Exploring the role of sound in augmenting visualization to enhance user engagement

M Du, JK Chou, C Ma… - 2018 IEEE Pacific …, 2018 - ieeexplore.ieee.org
Studies on augmenting visualization with sound are typically based on the assumption that
sound can be complementary and assist in data analysis tasks. While sound promotes a …

Detour light field rendering for diminished reality using unstructured multiple views

S Mori, M Maezawa, N Ienaga… - 2016 IEEE international …, 2016 - ieeexplore.ieee.org
Instructor's perspective videos are useful for presenting intuitive visual instructions for
trainees in medical and industrial settings. In such videos, the instructor's arms often obstruct …