Choosing models for security metrics visualization

M Kolomeec, G Gonzalez-Granadillo… - … Network Security: 7th …, 2017 - Springer
This paper aims at finding optimal visualization models for representation and analysis of
security related data, for example, security metrics, security incidents and cyber attack …

Vissecanalyzer: A visual analytics tool for network security assessment

I Kotenko, E Novikova - … and Intelligence Informatics: CD-ARES 2013 …, 2013 - Springer
Visualization is the essential part of Security Information and Event Management (SIEM)
systems. The paper suggests a common framework for SIEM visualization which allows …

[PDF][PDF] Methodological Primitives for Phased Construction of Data Visualization Models.

M Kolomeec, A Chechulin, IV Kotenko - J. Internet Serv. Inf. Secur., 2015 - researchgate.net
The paper considers common methodological primitives for phased construction of data
visualization models, which will help to create new graphical models of data security …

Visualization model for monitoring of computer networks security based on the analogue of voronoi diagrams

M Kolomeets, A Chechulin, I Kotenko - … in Information Systems: IFIP WG 8.4 …, 2016 - Springer
In this paper we propose an approach to the development of the computer network
visualization system for security monitoring, which uses a conceptually new model of …

An evaluation framework for network security visualizations

I Sharafaldin, AH Lashkari, AA Ghorbani - Computers & Security, 2019 - Elsevier
Visualization helps to comprehend and analyze large amounts of data, a fundamental
necessity for network security due to the large volume of audits traces produced each day. In …

From A to Z: developing a visual vocabulary for information security threat visualisation

E Li, J Barendse, F Brodbeck, A Tanner - Graphical Models for Security …, 2016 - Springer
Security visualisation is a very difficult problem due to its inherent need to represent
complexity and to be flexible for a wide range of applications. As a result, many current …

7 key challenges for visualization in cyber network defense

DM Best, A Endert, D Kidwell - Proceedings of the Eleventh Workshop …, 2014 - dl.acm.org
What does it take to be a successful visualization in cyber security? This question has been
explored for some time, resulting in many potential solutions being developed and offered to …

Security risk visualization with semantic risk model

OM Latvala, J Toivonen, A Evesti, M Sihvonen… - Procedia Computer …, 2016 - Elsevier
Understanding and analysing security risks is an essential task when designing and
maintaining a systems' security. The first risk analysis should be performed during the …

A survey, taxonomy, and analysis of network security visualization techniques

RR Kasemsri - 2006 - scholarworks.gsu.edu
Network security visualization is a relatively new field and is quickly gaining momentum.
Network security visualization allows the display and projection of the network or system …

A survey of visualization systems for network security

H Shiravi, A Shiravi, AA Ghorbani - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Security Visualization is a very young term. It expresses the idea that common visualization
techniques have been designed for use cases that are not supportive of security-related …