Proceedings of the Seventh International Symposium on Visualization for Cyber Security 2010
DOI: 10.1145/1850795.1850797
|View full text |Cite
|
Sign up to set email alerts
|

Proposing a multi-touch interface for intrusion detection environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 41 publications
0
4
0
Order By: Relevance
“…With the visual interface, users spent more time interacting with the interface to gather information, as some of the needed data was not readily available. On the other hand multi-touch interface for intrusion detection environments proposed [16] that includes an extensive ethnography to provide a richer understanding of socio-organizational development of ID environments, tools, and technologies. By using touch interaction, interface will enable exploration through the use of gestures to zoom, pan, and manipulate data.…”
Section: Types Of Usability Evaluation Techniques Used In Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…With the visual interface, users spent more time interacting with the interface to gather information, as some of the needed data was not readily available. On the other hand multi-touch interface for intrusion detection environments proposed [16] that includes an extensive ethnography to provide a richer understanding of socio-organizational development of ID environments, tools, and technologies. By using touch interaction, interface will enable exploration through the use of gestures to zoom, pan, and manipulate data.…”
Section: Types Of Usability Evaluation Techniques Used In Networkmentioning
confidence: 99%
“…The research is evolving in the network security community which helps to leverage the benefits of visualization to reduce the time and cognitive workload that associated with the ID task [14,30,56,60,63]. It also has evolved in using multi-touch design interface for network security analysts that help users to manage environmental complexity, afford intuitive analysis of traffic and make better decisions and provide a comprehensive data visualization/exploration tool for the security analysts [16].…”
Section: Usability Problem In Interfacementioning
confidence: 99%
“…Such as Guenther et al (2010) [1] compared with gesture inputting and traditional inputting, gesture inputting interface is more efficiency; Kine et al (2009) indicated that in selection task "one finger direct-touch is faster than using a mouse and bimanual interactions are faster than using one finger"; Park and Han (2010) [2] indicated that in regard to reaction time, icon size design 10 mm is better than 7 mm and 7 mm is better than 4 mm [2]; And Piper et al (2010) [3] compared with multi-touch inputting device and traditional inputting device by interview survey, they indicated "multi-touch inputting device is less intimidating, less frustrating, and less oppressive than a traditional computer".…”
Section: Introductionmentioning
confidence: 99%
“…Guenther et al introduced two new ideas to the community [24]. They suggest that multi-touch interactivity (e.g.…”
Section: Iterative Field Study Methodologymentioning
confidence: 99%