A survey on information visualization for network and service management

VT Guimaraes, CMDS Freitas, R Sadre… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Network and service management encompasses a set of activities, methods, procedures,
and tools, whose ultimate goal is to guarantee the proper functioning of a networked system …

2D transparency space—bring domain users and machine learning experts together

J Zhou, F Chen - Human and machine learning: Visible, explainable …, 2018 - Springer
Abstract Machine Learning (ML) is currently facing prolonged challenges with the user
acceptance of delivered solutions as well as seeing system misuse, disuse, or even failure …

Making machine learning useable

J Zhou, F Chen - International Journal of Intelligent Systems …, 2015 - inderscienceonline.com
Despite the recognised value of machine learning (ML) techniques and high expectation of
applying ML techniques within various applications, users often find it difficult to effectively …

Density approach: a new model for BigData analysis and visualization

J Zhang, ML Huang - Concurrency and Computation: Practice …, 2016 - Wiley Online Library
In this paper, we extended our density model to BigData analysis and visualization. BigData,
which contains images, videos, texts, audio files and other forms of data collected from …

Visual analytics for intrusion detection in spam emails

J Zhang, ML Huang, D Hoang - International Journal of …, 2013 - inderscienceonline.com
Spam email attacks are increasing at an alarming rate and have become more and more
cunning in nature. This has necessitated the need for visual spam email analysis within an …

Visual analytics model for intrusion detection in flood attack

J Zhang, ML Huang - … on Trust, Security and Privacy in …, 2013 - ieeexplore.ieee.org
Flood attacks are common forms of Distributed Denial-of-Service (DDoS) attack threats on
internet in nature. This has necessitated the need for visual analysis within an intrusion …

3DSVAT: A 3D stereoscopic vulnerability assessment tool for network security

T Nunnally, AS Uluagac, JA Copeland… - 37th Annual IEEE …, 2012 - ieeexplore.ieee.org
As the volume of network data continues to increase and networks become more complex,
the ability to accurately manage and analyze data quickly becomes a difficult problem. Many …

Factors affecting users cybersecurity practices: A study of Australian microbusinesses

H Jamil - 2023 - researchoutput.csu.edu.au
The current advancements in technologies and the internet industry provide users with an
endless, solid tool for entertainment, communication and trade. However, this brings new …

Visualizing geolocation of spam email

A Muallem, S Shetty… - … , Communications and IT …, 2013 - ieeexplore.ieee.org
With the recent surge in cyber attacks, there is a growing demand for effective security
analytics tools. Though, there are advanced data collection techniques in the form of …

Digital Forensics Tool Interface Visualization

RA Altiero - 2015 - search.proquest.com
Recent trends show digital devices utilized with increasing frequency in most crimes
committed. Investigating crime involving these devices is labor-intensive for the practitioner …