A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
EEVi –Framework and Guidelines to Evaluate the Effectiveness of Cyber-Security Visualizationt
2016
International Journal of Intelligent Computing Research
Cyber-security visualization aims to reduce security analysts' workload by presenting information as visual analytics instead of a string of text and characters. However, the adoption of the resultant visualizations by security analysts, is not widespread. The literature indicates a lack of guidelines and standardized evaluation techniques for effective visualization in cyber-security, as a reason for the low adoption rate. Consequently, this article addresses the research gap by introducing a
doi:10.20533/ijicr.2042.4655.2016.0094
fatcat:t6oxujip7bg4dcfbkodiz4zclu
more »
... ramework called EEVi for effective cyber-security visualizations for the performed task. The term 'effective visualization' is defined as the features of visualization that are critical for an analyst to competently perform a certain task. EEVi has been developed by analyzing qualitative data which led to the formation of cognitive relationships (called links) between data. These relationships acted as guidelines for effective cyber-security visualization to perform tasks. The methodology to develop this framework can be applied to other fields to understand cognitive relationships between data. Additionally, the analysis of the framework presented, demonstrates how EEVi can be put into practice using the guidelines for effective cyber-security visualization. The guidelines can be used to guide visualization developers to create effective visualizations for security analysts based on their requirements.
EEVi - framework for evaluating the effectiveness of visualization in cyber-security
2016
2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)
Cyber-security visualization is an up-and-coming area which aims to reduce security analysts' workload by presenting information as visual analytics rather than a string of text and characters. But the adoption of the resultant visualizations has not increased. The literature indicates a research gap of a lack of guidelines and standardized evaluation techniques for effective visualization in cyber-security, as a reason for it. Therefore, this research addresses the research gap by developing a
doi:10.1109/icitst.2016.7856726
dblp:conf/icitst/SethiPW16
fatcat:4xdueaosynh4jnboygv7hhox6u
more »
... framework called EEVi for effective cyber-security visualizations for the performed task. The term 'effective visualization' can be defined as the features of visualization that are crucial to perform a certain task successfully. EEVi has been developed by analyzing qualitative data that leads to the formation of cognitive relationships (called links) between data that act as guidelines for effective cyber-security visualization in terms of the performed task. The methodology to develop this framework can be applied to other fields to understand cognitive relationships between data. Additionally, the analysis presents a glimpse into the usage of EEVi in cyber-security visualization.
Graduation Ceremonies
2017
unpublished
Wang
Dandan Wang
Hong Wang
Jin Lei Wang
Jingzi Wang
Meng Wang
Ping Wang
Xiaojing Wang
Xingchun Wang
Yang Wang
Yongkai Wang
Zhao Qianhui Wang
Zhiting Wang
Cameron David Webb
Xiaotong Wen
Aneesha ...
Tapindersingh Multani
Vali Muhammad Nagaria
Nahida Akthar Netul
Thuyen Que Ngo
Thi Thu Huong Nguyen
Kunal Hasmukhbhai Patel
Shrey Patel
Arun Paul
Peng Mingming
Thi Ha Giang Pham
Xingyi Ren
Sanket Sethi ...
fatcat:lqmq7s4qxjgwppx5bexv3lbopy
Natural Products and Resources Repository Natural Products and Resources Repository Natural Products and Resources Repository Natural Products and Resources Repository A Ouarterly Electronic Repository of Current Information on Natural Products and Resources
2010
unpublished
Sethi, M. Srivastav, A.K. Dubey, R.R. Sharma, D.V.K. Samuel and A.K. Singh (Division of Post Harvest Technology, IARI, New Delhi 110012, India), Journal of Food Engineering, 2010, 97(2), 208-212]. ...
Rooted plantlets were successfully hardened and transferred to green house with 92% establishment [Aneesha Singh*, Muppla Parandhami Reddy, Jitendra Chikara and Sweta Singh ( Cowpea (Vigna unguiculata ...
fatcat:5gbi764exbdotkiuzkzt7tt3zq
A Matter of Trust: Three Case Studies of Chinese and Zambian Relationships at the Workplace
2017
Thanks to Wendy Prudencio, Aneesha Sethi, and Soule Sow for accompanying me on many nights at the Columbia University libraries and Emily Lee, Cindy Duong and Leilani Sevilla for phone and virtual support ...
doi:10.7916/d88k776m
fatcat:bahjh7sipjhjnpnjpzswgrzs2e