From a to z: Developing a visual vocabulary for information security threat visualisation

8Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Security visualisation is a very difficult problem due to its inherent need to represent complexity and to be flexible for a wide range of applications. As a result, many current approaches are not particularly effective. This paper presents several novel approaches for visualising information security threats which aim to create a flexible and effective basis for creating semantically rich threat visualisation diagrams. By presenting generalised approaches, these ideas can be applied to a wide variety of situations, as demonstrated in two specific visualisations: one for visualising attack trees, the other for visualising attack graphs. It concludes by discussing future work and introducing a novel exploration of attack models.

Cite

CITATION STYLE

APA

Li, E., Barendse, J., Brodbeck, F., & Tanner, A. (2016). From a to z: Developing a visual vocabulary for information security threat visualisation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9987 LNCS, pp. 102–118). Springer Verlag. https://doi.org/10.1007/978-3-319-46263-9_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free