[HTML][HTML] Graph Visualization: Alternative Models Inspired by Bioinformatics

M Kolomeets, V Desnitsky, I Kotenko, A Chechulin - Sensors, 2023 - mdpi.com
Currently, the methods and means of human–machine interaction and visualization as its
integral part are being increasingly developed. In various fields of scientific knowledge and …

Choosing models for security metrics visualization

M Kolomeec, G Gonzalez-Granadillo… - … Network Security: 7th …, 2017 - Springer
This paper aims at finding optimal visualization models for representation and analysis of
security related data, for example, security metrics, security incidents and cyber attack …

[PDF][PDF] A visual analytics approach for the cyber forensics based on different views of the network traffic.

IV Kotenko, M Kolomeets, A Chechulin… - J. Wirel. Mob. Networks …, 2018 - isyou.info
Network forensics is based on the analysis of network traffic. Traffic analysis is a routine
procedure, but it allows one to not only identify the cause of the security breach, but also …

Модель человеко-машинного взаимодействия на основе сенсорных экранов для мониторинга безопасности компьютерных сетей

ИВ Котенко, МВ Коломеец, ВИ Комашинский… - Региональная …, 2018 - elibrary.ru
В работе предлагается модель человеко–машинного взаимодействия на основе
сенсорных экранов для мониторинга безопасности компьютерных сетей …

[HTML][HTML] Методика визуализации метрик кибербезопасности

МВ Коломеец, АА Чечулин, ЕВ Дойникова… - Известия высших …, 2018 - cyberleninka.ru
Предложена методика визуализации метрик кибербезопасности для поддержки
принятия решений в процессах анализа рисков и выбора контрмер. Данная методика …

Using an event data taxonomy to represent the impact of cyber events as geometrical instances

G Gonzalez-Granadillo, J Rubio-Hernan… - IEEE …, 2017 - ieeexplore.ieee.org
Visualization and simulation models used for the evaluation and selection of security
countermeasures need accurate data to compute the impact of cyber events (eg, malicious …

Visual analytics for improving efficiency of network forensics: account theft investigation

A Chechulin, M Kolomeec… - Journal of Physics …, 2018 - iopscience.iop.org
In the paper, we propose a technique and means of visual analytics for network forensic
investigation. It is assumed that experts will be able to decrease the time required for …

Использование виртуальной и дополненной реальности для визуализации данных кибербезопасности

МВ Коломеец, ИВ Котенко, АА Чечулин - Защита информации …, 2017 - elibrary.ru
Системы визуализации помогают специалистам по безопасности отслеживать
киберугрозы и принимать контрмеры для защиты различных информационных и …

[PDF][PDF] The technique of structuring social network graphs for visual analysis of user groups to counter inappropriate, dubious and harmful information

M Kalameyets, A Chechulin… - Proceedings of the II …, 2018 - researchgate.net
The paper proposes a data visualizing technique for analyzing social networks in order to
identify and counteract inappropriate, dubious and harmful information. The proposed …

[图书][B] Computer Network Security: 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS …

J Rak, J Bay, I Kotenko, L Popyack, V Skormin… - 2017 - books.google.com
This volume contains papers presented at the 7th International Conference on Mathematical
Methods, Models, and Architectures for Computer Network Security (MMM-ACNS 2017) held …