A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is
Additionally, the analysis presents a glimpse into the usage of EEVi in cyber-security visualization. ... The literature indicates a research gap of a lack of guidelines and standardized evaluation techniques for effective visualization in cyber-security, as a reason for it. ... ACKNOWLEDGMENT We thank the University of Southampton for sponsoring and providing the necessary resources and guidance to perform this research. ...doi:10.1109/icitst.2016.7856726 dblp:conf/icitst/SethiPW16 fatcat:4xdueaosynh4jnboygv7hhox6u
The literature indicates a lack of guidelines and standardized evaluation techniques for effective visualization in cyber-security, as a reason for the low adoption rate. ... Additionally, the analysis of the framework presented, demonstrates how EEVi can be put into practice using the guidelines for effective cyber-security visualization. ... Analysis of EEVi -Guidelines for effective cyber-security visualization The structure of EEVi was developed using a storyline which led to the generic framework. ...doi:10.20533/ijicr.2042.4655.2016.0094 fatcat:t6oxujip7bg4dcfbkodiz4zclu