Working paper icon

Working paper

Stereoscopic cyber security visualisations

Abstract:

Text-based tools are the primary tools of cyber-analysts, despite the potential visual tools have in this field [1]. Currently, analysts rely on command line tools which are favoured for their interoperability and flexibility. While many visualisations for cyber security data exist, they suffer from lack of adoption, due to not fitting in with the workflow of their users [2]. Some of the key challenges for security analysis are well-suited for visual solutions. Security analysts are common...

Expand abstract
Publication status:
Not published
Peer review status:
Not peer reviewed

Actions


Access Document


Files:

Authors


More by this author
Institution:
University of Oxford
Division:
Cross-academic groups
Department:
CDT in Cyber Security
Role:
Author
Series:
CDT Technical Paper
Publication date:
2015-09-02
Paper number:
13/15
Language:
English
Keywords:
Subjects:
UUID:
uuid:4f69e6d1-4041-40cc-9471-c65c8c79eae0
Deposit date:
2015-09-02

Terms of use


Views and Downloads






If you are the owner of this record, you can report an update to it here: Report update to this record

TO TOP