Filters








5 Hits in 1.1 sec

EEVi –Framework and Guidelines to Evaluate the Effectiveness of Cyber-Security Visualizationt

Aneesha Sethi, Federica Paci, Gary Wills
2016 International Journal of Intelligent Computing Research  
Cyber-security visualization aims to reduce security analysts' workload by presenting information as visual analytics instead of a string of text and characters. However, the adoption of the resultant visualizations by security analysts, is not widespread. The literature indicates a lack of guidelines and standardized evaluation techniques for effective visualization in cyber-security, as a reason for the low adoption rate. Consequently, this article addresses the research gap by introducing a
more » ... ramework called EEVi for effective cyber-security visualizations for the performed task. The term 'effective visualization' is defined as the features of visualization that are critical for an analyst to competently perform a certain task. EEVi has been developed by analyzing qualitative data which led to the formation of cognitive relationships (called links) between data. These relationships acted as guidelines for effective cyber-security visualization to perform tasks. The methodology to develop this framework can be applied to other fields to understand cognitive relationships between data. Additionally, the analysis of the framework presented, demonstrates how EEVi can be put into practice using the guidelines for effective cyber-security visualization. The guidelines can be used to guide visualization developers to create effective visualizations for security analysts based on their requirements.
doi:10.20533/ijicr.2042.4655.2016.0094 fatcat:t6oxujip7bg4dcfbkodiz4zclu

EEVi - framework for evaluating the effectiveness of visualization in cyber-security

Aneesha Sethi, Federica Paci, Gary Wills
2016 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)  
Cyber-security visualization is an up-and-coming area which aims to reduce security analysts' workload by presenting information as visual analytics rather than a string of text and characters. But the adoption of the resultant visualizations has not increased. The literature indicates a research gap of a lack of guidelines and standardized evaluation techniques for effective visualization in cyber-security, as a reason for it. Therefore, this research addresses the research gap by developing a
more » ... framework called EEVi for effective cyber-security visualizations for the performed task. The term 'effective visualization' can be defined as the features of visualization that are crucial to perform a certain task successfully. EEVi has been developed by analyzing qualitative data that leads to the formation of cognitive relationships (called links) between data that act as guidelines for effective cyber-security visualization in terms of the performed task. The methodology to develop this framework can be applied to other fields to understand cognitive relationships between data. Additionally, the analysis presents a glimpse into the usage of EEVi in cyber-security visualization.
doi:10.1109/icitst.2016.7856726 dblp:conf/icitst/SethiPW16 fatcat:4xdueaosynh4jnboygv7hhox6u

Graduation Ceremonies

Geelong
2017 unpublished
Wang Dandan Wang Hong Wang Jin Lei Wang Jingzi Wang Meng Wang Ping Wang Xiaojing Wang Xingchun Wang Yang Wang Yongkai Wang Zhao Qianhui Wang Zhiting Wang Cameron David Webb Xiaotong Wen Aneesha  ...  Tapindersingh Multani Vali Muhammad Nagaria Nahida Akthar Netul Thuyen Que Ngo Thi Thu Huong Nguyen Kunal Hasmukhbhai Patel Shrey Patel Arun Paul Peng Mingming Thi Ha Giang Pham Xingyi Ren Sanket Sethi  ... 
fatcat:lqmq7s4qxjgwppx5bexv3lbopy

Natural Products and Resources Repository Natural Products and Resources Repository Natural Products and Resources Repository Natural Products and Resources Repository A Ouarterly Electronic Repository of Current Information on Natural Products and Resources

Nat Prod, Resour Repos
2010 unpublished
Sethi, M. Srivastav, A.K. Dubey, R.R. Sharma, D.V.K. Samuel and A.K. Singh (Division of Post Harvest Technology, IARI, New Delhi 110012, India), Journal of Food Engineering, 2010, 97(2), 208-212].  ...  Rooted plantlets were successfully hardened and transferred to green house with 92% establishment [Aneesha Singh*, Muppla Parandhami Reddy, Jitendra Chikara and Sweta Singh ( Cowpea (Vigna unguiculata  ... 
fatcat:5gbi764exbdotkiuzkzt7tt3zq

A Matter of Trust: Three Case Studies of Chinese and Zambian Relationships at the Workplace

Janny Chang
2017
Thanks to Wendy Prudencio, Aneesha Sethi, and Soule Sow for accompanying me on many nights at the Columbia University libraries and Emily Lee, Cindy Duong and Leilani Sevilla for phone and virtual support  ... 
doi:10.7916/d88k776m fatcat:bahjh7sipjhjnpnjpzswgrzs2e