Survey on the visualization technologies of threatening security data in cyber space
With the rapid development of the cyber threatening methods,the requirements of network security data analysis become more and more imperative.Data visualization has already evolved as a requisite tool among all kinds of data analysis theory framework and applications,especially in the fields of sci...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2018-02-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018013 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841530150696517632 |
---|---|
author | Fan ZHANG Fan XIE Jie JIANG |
author_facet | Fan ZHANG Fan XIE Jie JIANG |
author_sort | Fan ZHANG |
collection | DOAJ |
description | With the rapid development of the cyber threatening methods,the requirements of network security data analysis become more and more imperative.Data visualization has already evolved as a requisite tool among all kinds of data analysis theory framework and applications,especially in the fields of scientific computation,business intelligence and cyber security.Threatening security data visualization provides various effective interaction means which improve the perception ability for the cyber security specialists to get a distinctive insight into the large amount of complicated cyber security problems.The state-of-art cyber security data visualization technologies were introduced.Some existing problems that were still challenging research topics were investigated.Some directions for future studies were outlined. |
format | Article |
id | doaj-art-92f0a18f560642b5bdb33421c1e0ff7e |
institution | Kabale University |
issn | 2096-109X |
language | English |
publishDate | 2018-02-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj-art-92f0a18f560642b5bdb33421c1e0ff7e2025-01-15T03:12:33ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2018-02-014343959552737Survey on the visualization technologies of threatening security data in cyber spaceFan ZHANGFan XIEJie JIANGWith the rapid development of the cyber threatening methods,the requirements of network security data analysis become more and more imperative.Data visualization has already evolved as a requisite tool among all kinds of data analysis theory framework and applications,especially in the fields of scientific computation,business intelligence and cyber security.Threatening security data visualization provides various effective interaction means which improve the perception ability for the cyber security specialists to get a distinctive insight into the large amount of complicated cyber security problems.The state-of-art cyber security data visualization technologies were introduced.Some existing problems that were still challenging research topics were investigated.Some directions for future studies were outlined.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018013cyber space securityassociate analysisvisual analysisartificial intelligence |
spellingShingle | Fan ZHANG Fan XIE Jie JIANG Survey on the visualization technologies of threatening security data in cyber space 网络与信息安全学报 cyber space security associate analysis visual analysis artificial intelligence |
title | Survey on the visualization technologies of threatening security data in cyber space |
title_full | Survey on the visualization technologies of threatening security data in cyber space |
title_fullStr | Survey on the visualization technologies of threatening security data in cyber space |
title_full_unstemmed | Survey on the visualization technologies of threatening security data in cyber space |
title_short | Survey on the visualization technologies of threatening security data in cyber space |
title_sort | survey on the visualization technologies of threatening security data in cyber space |
topic | cyber space security associate analysis visual analysis artificial intelligence |
url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018013 |
work_keys_str_mv | AT fanzhang surveyonthevisualizationtechnologiesofthreateningsecuritydataincyberspace AT fanxie surveyonthevisualizationtechnologiesofthreateningsecuritydataincyberspace AT jiejiang surveyonthevisualizationtechnologiesofthreateningsecuritydataincyberspace |