12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops 2011
DOI: 10.1109/inm.2011.5990663
|View full text |Cite
|
Sign up to set email alerts
|

Cover-VT: Converged Security Visualization Tool

Abstract: The amount of data that floods toda y 's networks is well be y ond what securit y anal y sts can manage b y textual means alone. In an effort to solve this problem, researchers have explored different methods of visualizing network securit y threats. There is little debate that humans can perceive more information visuall y than textuall y . The problem is that the majorit y of visualization tools in practice or proposed do not take efficient visualization techniques into consideration. As a result, it is diff… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2016
2016

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 9 publications
0
1
0
Order By: Relevance
“…While previous research [7], [8] focused on visualization through shape among various visualization elements, this study focused on recognition of security elements and threats.…”
Section: Study On Security Log Visualization and Security Threat Detementioning
confidence: 99%
“…While previous research [7], [8] focused on visualization through shape among various visualization elements, this study focused on recognition of security elements and threats.…”
Section: Study On Security Log Visualization and Security Threat Detementioning
confidence: 99%