A task centered framework for computer security data visualization

被引:0
|
作者
Suo, Xiaoyuan [1 ]
Zhu, Ying [1 ]
Owen, Scott [1 ]
机构
[1] Georgia State Univ, Dept Comp Sci, Atlanta, GA 30303 USA
关键词
visualization; task; computer security;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Most of the existing computer security visualization programs are data centered. However, some studies have shown that task centered visualization is perhaps more effective. To test this hypothesis, we have developed a new framework of visualization and apply it to computer security visualization. This framework provides a new way for users to interact with data set and potentially will provide new insights into how visualization can be better constructed to serve users' specific tasks.
引用
收藏
页码:87 / 94
页数:8
相关论文
共 50 条
  • [31] COMPUTER DATA SECURITY - KATZAN,H
    PATRICK, B
    [J]. DATAMATION, 1974, 20 (04): : 205 - 206
  • [32] COMPUTER SECURITY AUTHENTICATION AND DATA PROTECTION
    PRITCHARD, JAT
    [J]. JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 1980, 31 (01) : 110 - 110
  • [33] Computer Security for Data Collection Technologies
    Cobb, Camille
    Sudar, Samuel
    Reiter, Nicholas
    Anderson, Richard
    Roesner, Franziska
    Kohno, Tadayoshi
    [J]. PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES AND DEVELOPMENT (ICTD 2016), 2016,
  • [34] Computer security when data = life
    Camp, J
    [J]. 2000 IEEE EMBS INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY APPLICATIONS IN BIOMEDICINE, PROCEEDINGS, 2000, : 3 - 3
  • [35] Data Security in Computer Systems.
    Pieprzyk, Jozef
    Rutkowski, Dominik
    [J]. Rozprawy Elektrotechniczne, 1982, 28 (3-4): : 489 - 517
  • [36] Applications of computer graphics to the visualization of meteorological data
    Papathomas, T.V.
    Schiavone, J.A.
    Julesz, B.
    [J]. Computer Graphics (ACM), 1988, 22 (04): : 327 - 334
  • [37] A Task-Centered Framework for Computationally-Grounded Science Collaborations
    Gil, Yolanda
    Michel, Felix
    Ratnakar, Varun
    Hauder, Matheus
    Duffy, Christopher
    Dugan, Hilary
    Hanson, Paul
    [J]. 2015 IEEE 11TH INTERNATIONAL CONFERENCE ON E-SCIENCE, 2015, : 352 - 361
  • [38] A Process Framework for Stakeholder-specific Visualization of Security Metrics
    Hanauer, Tanja
    Hommel, Wolfgang
    Metzger, Stefan
    Poehn, Daniela
    [J]. 13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [39] EEVi - Framework for Evaluating the Effectiveness of Visualization in Cyber-Security
    Sethi, Aneesha
    Paci, Federica
    Wills, Gary
    [J]. 2016 11TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2016, : 340 - 345
  • [40] A Framework for Multimedia Data Hiding (Security)
    Akeem, Owoade A.
    Onifade, O. F. W.
    Olatunji, Okesola J.
    Latifat, Abimbola B.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (12): : 99 - 104