Sciweavers

76 search results - page 11 / 16
» Cyber security through visualization
Sort
View
IV
2009
IEEE
124views Visualization» more  IV 2009»
14 years 4 months ago
Needs Assessment for the Design of Information Synthesis Visual Analytics Tools
Information synthesis is a key portion of the analysis process with visual analytics tools. This stage of work requires users to collect, organize, and add meaning to individual a...
Anthony C. Robinson
SOUPS
2005
ACM
14 years 3 months ago
Two experiences designing for effective security
In our research, we have been concerned with the question of how to make relevant features of security situations visible to users in order to allow them to make informed decision...
Rogério de Paula, Xianghua Ding, Paul Douri...
JDCTA
2008
535views more  JDCTA 2008»
13 years 9 months ago
Steganography: DCT Coefficients Reparation Technique in JPEG Image
Due to the ever-growing usage of the computer, it has led to a rapid increment in the data that is being exchanged, published and stored in an assortment of digital form. This phe...
Chiew Kang Leng, Jane Labadin, Sarah Flora Samson ...
ITRUST
2005
Springer
14 years 3 months ago
ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements
ST-Tool is a graphical tool integrating an agent-oriented requirements engineering methodology with tools for the formal analysis of models. Essentially, the tool allows designers ...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, A...
VLC
2008
146views more  VLC 2008»
13 years 9 months ago
Interactive visual analysis of geographic data on mobile devices based on dynamic queries
The capabilities of current mobile devices, especially PDAs, are making it possible to design and develop mobile applications that employ visual techniques for using geographic da...
Stefano Burigat, Luca Chittaro