A User-Centered Multi-space Collaborative Visual Analysis for Cyber Security

被引:0
|
作者
ZHONG Zengsheng [1 ,2 ]
ZHAO Ying [1 ]
SHI Ronghua [1 ]
SHENG Yingshuai [1 ]
LIU Junrong [3 ]
MENG Hua [2 ]
LIN Dan [2 ]
机构
[1] School of Information Science and Engineering,Central South University
[2] Information Office,Chongqing Technology and Business University
[3] Key Laboratory of Network Assessment Technology,Institute of Information Engineering,Chinese Academy of Sciences
基金
中国国家自然科学基金;
关键词
Cyber security; Campus network management; Visual analytics; User evaluation;
D O I
暂无
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
Based on a university’s practice in upgrading its network management platform, presents a visual analytic system which integrates network topological space,IP space and network geographical space into a collaborative solution to help network administrators address difficulties in locating end user and troubleshooting. Throughout the development cycle, we worked alongside with users to clarify their actual demands and habitual operations through scenario application, interviews and a variety of evaluation. This user-centered approach guides us step by step to apply cyber security visualization and visual analytic technology to actual use.
引用
收藏
页码:910 / 919
页数:10
相关论文
共 50 条
  • [41] User-Centered Development of a Visual Exploration System for In-Car Communication
    Sedlmair, Michael
    Kunze, Benjamin
    Hintermaier, Wolfgang
    Butz, Andreas
    SMART GRAPHICS, PROCEEDINGS, 2009, 5531 : 105 - +
  • [42] pQUANT: A User-Centered Privacy Risk Analysis Framework
    Tesfay, Welderufael B.
    Nastouli, Dimitra
    Stamatiou, Yannis C.
    Serna, Jetzabel M.
    RISKS AND SECURITY OF INTERNET AND SYSTEMS (CRISIS 2019), 2020, 12026 : 3 - 16
  • [43] User-centered road network traffic analysis with MobilityDB
    Sakr, Mahmoud
    Zimanyi, Esteban
    Vaisman, Alejandro
    Bakli, Mohamed
    TRANSACTIONS IN GIS, 2023, 27 (02) : 323 - 346
  • [44] Deployment of simple user-centered collaborative technologies in educational institutions - Experiences and requirements
    Hampel, T
    Selke, H
    Vitt, S
    Fourteenth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, Proceedings, 2005, : 207 - 212
  • [45] User-Centered Design of a Collaborative, Object Oriented Historical GI-Platform
    De Maeyer, Philippe
    Ranson, Elien
    Ooms, Kristien
    De Coene, Karen
    De Wit, Bart
    Van den Berghe, Michiel
    Vrielinck, Sven
    Wiedemann, Torsten
    Winter, Anne
    Kruk, Rink
    Devos, Isabelle
    DISSEMINATION OF CARTOGRAPHIC KNOWLEDGE, 2018, : 379 - 390
  • [46] User-centered Security Management of API-based Data Integration Workflows
    Suzic, Bojan
    NOMS 2016 - 2016 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2016, : 1233 - 1238
  • [47] Neural Signatures of User-Centered Security: An fMRI Study of Phishing, and Malware Warnings
    Neupane, Ajaya
    Saxena, Nitesh
    Kuruvilla, Keya
    Georgescu, Michael
    Kana, Rajesh
    21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
  • [48] A User-centered Multi-agent Framework for Extensible Modular Design
    Wang, Y. Q.
    Huang, Y. Q.
    Xie, Q. S.
    Li, J. T.
    ADVANCES IN MATERIALS MANUFACTURING SCIENCE AND TECHNOLOGY XIII, VOL II: MODERN DESIGN THEORY AND METHODOLOGY, MEMS AND NANOTECHNOLOGY, AND MATERIAL SCIENCE AND TECHNOLOGY IN MANUFACTURING, 2009, 628-629 : 149 - 154
  • [49] Synthesizing visual digital library research to formulate a user-centered evaluation framework
    Albertson, Dan
    NEW LIBRARY WORLD, 2015, 116 (3-4) : 122 - 135
  • [50] MANA: Designing and Validating a User-Centered Mobility Analysis System
    Anderson, Boyd
    Zhu, Shenggao
    Yang, Ke
    Wang, Jian
    Anderson, Hugh
    Tay, Chao Xu
    Tan, Vincent Y. F.
    Wang, Ye
    ASSETS'18: PROCEEDINGS OF THE 20TH INTERNATIONAL ACM SIGACCESS CONFERENCE ON COMPUTERS AND ACCESSIBILITY, 2018, : 321 - 332