2009
DOI: 10.1007/978-3-642-00219-9_2
|View full text |Cite
|
Sign up to set email alerts
|

Graph Drawing for Security Visualization

Abstract: Abstract. With the number of devices connected to the internet growing rapidly and software systems being increasingly deployed on the web, security and privacy have become crucial properties for networks and applications. Due the complexity and subtlety of cryptographic methods and protocols, software architects and developers often fail to incorporate security principles in their designs and implementations. Also, most users have minimal understanding of security threats. While several tools for developers, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
29
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(29 citation statements)
references
References 18 publications
0
29
0
Order By: Relevance
“…The concept of the model (integration with other disciplines) [16, 18, 39, 45, 50-57, 63, 67, 68] The completeness and regularization of data acquisition variables [40,42,45,47,73,87] The optimization of related algorithms [58][59][60][61][62][63][64][65][66][67] The information fusion analysis [40,42,53,[69][70][71][72][73][74] The automation of process tools [33-35, 73, 75, 84, 85, 87] The visualization of work at each stage [5,11,55,61,[76][77][78][79]86] Practice testing and efficiency gains in large-scale real-world networks [80][81][82] The software engineering implementation of sensing methods [42,[83][84][85]88] The practical application of analysis and prediction results in specific fields [42,47,…”
Section: Status Of Foreign Researchmentioning
confidence: 99%
See 1 more Smart Citation
“…The concept of the model (integration with other disciplines) [16, 18, 39, 45, 50-57, 63, 67, 68] The completeness and regularization of data acquisition variables [40,42,45,47,73,87] The optimization of related algorithms [58][59][60][61][62][63][64][65][66][67] The information fusion analysis [40,42,53,[69][70][71][72][73][74] The automation of process tools [33-35, 73, 75, 84, 85, 87] The visualization of work at each stage [5,11,55,61,[76][77][78][79]86] Practice testing and efficiency gains in large-scale real-world networks [80][81][82] The software engineering implementation of sensing methods [42,[83][84][85]88] The practical application of analysis and prediction results in specific fields [42,47,…”
Section: Status Of Foreign Researchmentioning
confidence: 99%
“…Visualization is undoubtedly an important part of network security situational awareness [86]. Tamassia et al [76] give a clear statistical result on this aspect. Most of the current literature focuses on the friendly interaction between human and machine.…”
Section: Status Of Foreign Researchmentioning
confidence: 99%
“…Information security: There is emerging research investigating the use of information visualization for security purposes [BKvOS10, BJL*13, TPP09].…”
Section: Related Workmentioning
confidence: 99%
“…The ultimate goal for security visualization tools is to present the data as simply as possible. To achieve this ambitious objective, numerous graph drawing problems have to be addressed [10]. These generally involve optimizing some aesthetic properties of the graph layout such as the number of edge crossings, the number of edge bends, etc.…”
Section: Related Workmentioning
confidence: 99%