Towards Classifying and Selecting Appropriate Security Visualization Techniques

Submitted by Katie Dey on

ABSTRACT:

Visualization of network security events has become an important method for detecting, responding to, and resolving security incidents. While there are many security visualization tools and techniques available, each one may require a different run-time environment and data input, making it difficult for a network security analyst to try them all (or a significant subset) and select those that work best for a specific incident or purpose.

Subscribe to