A User-Centered Multi-space Collaborative Visual Analysis for Cyber Security

被引:0
|
作者
ZHONG Zengsheng [1 ,2 ]
ZHAO Ying [1 ]
SHI Ronghua [1 ]
SHENG Yingshuai [1 ]
LIU Junrong [3 ]
MENG Hua [2 ]
LIN Dan [2 ]
机构
[1] School of Information Science and Engineering,Central South University
[2] Information Office,Chongqing Technology and Business University
[3] Key Laboratory of Network Assessment Technology,Institute of Information Engineering,Chinese Academy of Sciences
基金
中国国家自然科学基金;
关键词
Cyber security; Campus network management; Visual analytics; User evaluation;
D O I
暂无
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
Based on a university’s practice in upgrading its network management platform, presents a visual analytic system which integrates network topological space,IP space and network geographical space into a collaborative solution to help network administrators address difficulties in locating end user and troubleshooting. Throughout the development cycle, we worked alongside with users to clarify their actual demands and habitual operations through scenario application, interviews and a variety of evaluation. This user-centered approach guides us step by step to apply cyber security visualization and visual analytic technology to actual use.
引用
收藏
页码:910 / 919
页数:10
相关论文
共 50 条
  • [21] POSTER: Secure Chat for the Masses? User-centered Security to the Rescue
    Abu-Salma, Ruba
    Sasse, M. Angela
    Bonneau, Joseph
    Smith, Matthew
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1623 - 1625
  • [22] Experiential User-Centered Security in a Classroom: Secure Design for IoT
    Sharevski, Filipo
    Treebridge, Paige
    Westbrook, Jessica
    IEEE COMMUNICATIONS MAGAZINE, 2019, 57 (11) : 48 - 53
  • [23] Exploring User-Centered Security Design for Usable Authentication Ceremonies
    Fassl, Matthias
    Grober, Lea Theresa
    Krombholz, Katharina
    CHI '21: PROCEEDINGS OF THE 2021 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2021,
  • [24] Analysis of sentiment expressions for user-centered design
    Han, Yi
    Moghaddam, Mohsen
    EXPERT SYSTEMS WITH APPLICATIONS, 2021, 171
  • [25] Prosthesis-User-in-the-Loop: User-Centered Design Parameters and Visual Simulation
    Christ, O.
    Wojtusch, J.
    Beckerle, P.
    Wolff, K.
    Vogt, J.
    von Stryk, O.
    Rinderknecht, S.
    2012 ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY (EMBC), 2012, : 1929 - 1932
  • [26] User-centered discourse: An analysis of the subject positions of the user and the librarian
    Tuominen, K
    LIBRARY QUARTERLY, 1997, 67 (04): : 350 - 371
  • [27] A user-centered design and analysis of an electrostatic haptic touchscreen system for students with visual impairments
    Bateman, Amelia
    Zhao, Oliver K.
    Bajcsy, Andrea V.
    Jennings, Mathew C.
    Toth, Bryan N.
    Cohen, Alexa J.
    Horton, Emily L.
    Khattar, Anish
    Kuo, Ryan S.
    Lee, Felix A.
    Lim, Meilin K.
    Migasiuk, Laura W.
    Renganathan, Ramkesh
    Zhang, Amy
    Oliveira, Marcio A.
    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2018, 109 : 102 - 111
  • [28] Empowering Collaborative Intelligence by the use of User-centered Social Network Aggregation
    Xuan Truong Vu
    Morizet-Mahoudeaux, Pierre
    Abel, Marie-Helene
    2013 IEEE/WIC/ACM INTERNATIONAL JOINT CONFERENCES ON WEB INTELLIGENCE (WI) AND INTELLIGENT AGENT TECHNOLOGIES (IAT), VOL 1, 2013, : 425 - 430
  • [29] User-centered visual analysis using a hybrid reasoning architecture for intensive care units
    Kamsu-Foguem, Bernard
    Tchuente-Foguem, Germaine
    Allart, Laurent
    Zennir, Youcef
    Vilhelm, Christian
    Mehdaoui, Hossein
    Zitouni, Djamel
    Hubert, Herve
    Lemdani, Mohamed
    Ravaux, Pierre
    DECISION SUPPORT SYSTEMS, 2012, 54 (01) : 496 - 509
  • [30] A collaborative user-centered framework for recommending items in Online Social Networks
    Colace, Francesco
    De Santo, Massimo
    Greco, Luca
    Moscato, Vincenzo
    Picariello, Antonio
    COMPUTERS IN HUMAN BEHAVIOR, 2015, 51 : 694 - 704