Measuring the complexity of computer security visualization designs

被引:3
|
作者
Suo, X. [1 ]
Zhu, Y. [1 ]
Owen, G. Scott [1 ]
机构
[1] Georgia State Univ, Dept Comp Sci, Atlanta, GA 30303 USA
来源
VIZSEC 2007 | 2008年
关键词
D O I
10.1007/978-3-540-78243-8_4
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We present a novel method to measure the complexity of computer security visualization designs. The complexity is measured in terms of visual integration, number of separable dimensions for each visual unit, the complexity of interpreting the visual attributes, and the efficiency of visual search. Visualization developers can use this method to quickly evaluate multiple design choices in the early stage of their design before any user study can be conducted. To demonstrate this method, we have conducted complexity analysis on two open source security visualization tools - TNV and RUMINT.
引用
收藏
页码:53 / 66
页数:14
相关论文
共 50 条
  • [31] A visualization tool for situational awareness of tactical and strategic security events on large and complex computer networks
    Bearavolu, R
    Lakkaraju, K
    Yurcik, W
    Raje, H
    [J]. MILCOM 2003 - 2003 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2003, : 850 - 855
  • [32] Measuring the 'complexity' of sound
    Singh, Nandini Chatterjee
    [J]. PRAMANA-JOURNAL OF PHYSICS, 2011, 77 (05): : 811 - 816
  • [33] Measuring complexity with zippers
    Baronchelli, A
    Caglioti, E
    Loreto, V
    [J]. EUROPEAN JOURNAL OF PHYSICS, 2005, 26 (05) : S69 - S77
  • [34] Computer simulation and visualization
    Johnson, Chris
    [J]. Mathematics and Culture IV, 2007, : 71 - +
  • [35] COMPUTER SECURITY
    MANUEL, T
    [J]. ELECTRONICS, 1984, 57 (05): : 121 - 121
  • [37] COMPUTER SECURITY
    RUDALL, BH
    [J]. KYBERNETES, 1989, 18 (03) : 6 - 8
  • [38] COMPUTER SECURITY
    SENDROW, M
    [J]. IEEE SPECTRUM, 1983, 20 (01) : 12 - 12
  • [39] Computer security?
    Needham, R
    [J]. COMPUTER SYSTEMS: THEORY, TECHNOLOGY AND APPLICATIONS: A TRIBUTE TO ROGER NEEDHAM, 2004, : 319 - 326
  • [40] COMPUTER SECURITY
    PATTI, TS
    [J]. RADIO-ELECTRONICS, 1984, 55 (05): : 14 - 14