Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Entire DC Network
Toward A Heuristic Model For Evaluating The Complexity Of Computer Security Visualization Interface, Hsiu-Chung Wang
Toward A Heuristic Model For Evaluating The Complexity Of Computer Security Visualization Interface, Hsiu-Chung Wang
Computer Science Theses
Computer security visualization has gained much attention in the research community in the past few years. However, the advancement in security visualization research has been hampered by the lack of standardization in visualization design, centralized datasets, and evaluation methods. We propose a new heuristic model for evaluating the complexity of computer security visualizations. This complexity evaluation method is designed to evaluate the efficiency of performing visual search in security visualizations in terms of measuring critical memory capacity load needed to perform such tasks. Our method is based on research in cognitive psychology along with characteristics found in a majority of …
A Survey, Taxonomy, And Analysis Of Network Security Visualization Techniques, Rawiroj Robert Kasemsri
A Survey, Taxonomy, And Analysis Of Network Security Visualization Techniques, Rawiroj Robert Kasemsri
Computer Science Theses
Network security visualization is a relatively new field and is quickly gaining momentum. Network security visualization allows the display and projection of the network or system data, in hope to efficiently monitor and protect the system from any intrusions or possible attacks. Intrusions and attacks are constantly continuing to increase in number, size, and complexity. Textually reading through log files or other textual sources is currently insufficient to secure a network or system. Using graphical visualization, security information is presented visually, and not only by text. Without network security visualization, reading through log files or other textual sources is an …