A survey on information visualization for network and service management

VT Guimaraes, CMDS Freitas, R Sadre… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Network and service management encompasses a set of activities, methods, procedures,
and tools, whose ultimate goal is to guarantee the proper functioning of a networked system …

Unlocking user-centered design methods for building cyber security visualizations

S McKenna, D Staheli, M Meyer - 2015 IEEE Symposium on …, 2015 - ieeexplore.ieee.org
User-centered design can aid visualization designers to build better, more practical tools
that meet the needs of cyber security users. The cyber security visualization research …

[HTML][HTML] Cognitive Analysis of Intrusion Detection System

BS Masood, R Carmen - Журнал Сибирского федерального …, 2022 - cyberleninka.ru
Usability evaluation methods have gained a substantial attention in networks particularly in
Intrusion Detection System (IDS) as these evaluation methods are envisioned to achieve …

A team-level perspective of human factors in cyber security: security operations centers

BP Hámornik, C Krasznay - Advances in Human Factors in Cybersecurity …, 2018 - Springer
The paper aims to establish a research framework: encompass various fields of interest that
have not been linked previously: the information security, the computer supported …

IF-City: Intelligible fair city planning to measure, explain and mitigate inequality

Y Lyu, H Lu, MK Lee, G Schmitt… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the increasing pervasiveness of Artificial Intelligence (AI), many visual analytics tools
have been proposed to examine fairness, but they mostly focus on data scientist users …

Focusing on context in network traffic analysis

JR Goodall, WG Lutters, P Rheingans… - IEEE Computer …, 2006 - ieeexplore.ieee.org
The time-based network traffic visualizer combines low-level, textual detail with multiple
visualizations of the larger context to help users construct a security event's big picture. TNV …

Command line or pretty lines? Comparing textual and visual interfaces for intrusion detection

RS Thompson, EM Rantanen, W Yurcik… - Proceedings of the …, 2007 - dl.acm.org
Intrusion detection (ID) is one of network security engineers' most important tasks. Textual
(command-line) and visual interfaces are two common modalities used to support engineers …

Visualizing network security events using compound glyphs from a service-oriented perspective

J Pearlman, P Rheingans - VizSEC 2007: Proceedings of the Workshop …, 2008 - Springer
Network security is the complicated field of controlling access within a computer network.
One of the difficulties in network security is detecting the presence, severity, and type of a …

Exploring the Representation of Cyber-Risk Data Through Sketching

T Miller, M Sturdee, D Prince - 2023 IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Dealing with complex information regarding cyber security risks is increasingly important as
attacks rise in frequency. Visualisation techniques are used to support decision-making and …

Human-computer interaction viewed from the intersection of privacy, security, and trust

J Karat, CM Karat, C Brodie - The Human-Computer Interaction …, 2007 - taylorfrancis.com
In summary, security involves technology to ensure that information is appropriately
protected. It involves users in that security features such as passwords for access control or …