A Design Methodology and Implementation for Corporate Network Security Visualization: A Modular-Based Approach

  • et al.
N/ACitations
Citations of this article
9Readers
Mendeley users who have this article in their library.

Abstract

Research surrounding visualization for computer and network security has produced differing accepted methods for adequately developing security visualization products. The current work proposes a design methodology that melds the research of the three competing frameworks for security visualization development. In addition, a product that incorporates the proposed design methodology is developed, used, and evaluated. Findings show that users of the system believe the system has increased their effectiveness at performing network security tasks and are likely to use such a system in the future.

Cite

CITATION STYLE

APA

Luse, A. … Jacobson, D. (2011). A Design Methodology and Implementation for Corporate Network Security Visualization: A Modular-Based Approach. AIS Transactions on Human-Computer Interaction, 3(2), 104–132. https://doi.org/10.17705/1thci.00029

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free