About: Visual Analytics Applied To Cyber Security     Goto   Sponge   NotDistinct   Permalink

An Entity of Type : http://linked.opendata.cz/ontology/domain/vavai/Vysledek, within Data Space : linked.opendata.cz associated with source document(s)

AttributesValues
rdf:type
rdfs:seeAlso
Description
  • The field of Visual Analytics (VA) seeks to combine computational power, visual display, and human capabilities in order to extract knowledge from large, heterogeneous data sets. VA is in part a response to the scale and complexity of information that is now potentially available. It seeks to aid people in making sense of the world by helping them identify and exploit relevant information. Within the field of VA we are trying to exploit and enable the considerable capabilities of the human visual perceptual process. Visual analytics techniques can be extremely helpful to addressing the potential and actual consequences of cyber attacks. Visual analytics, when applied to anomalous network behaviours, could provide a basis for a real-time indications and warnings system usable for supposed cyber incidents. Visual Analytics arose in the post nine-eleven eras in order to provide tools to the analyst to aid in the identification of threats. It was formulated primarily by experts from the field of information visualization and emphasized visual tools for information understanding and extracting patterns.
  • The field of Visual Analytics (VA) seeks to combine computational power, visual display, and human capabilities in order to extract knowledge from large, heterogeneous data sets. VA is in part a response to the scale and complexity of information that is now potentially available. It seeks to aid people in making sense of the world by helping them identify and exploit relevant information. Within the field of VA we are trying to exploit and enable the considerable capabilities of the human visual perceptual process. Visual analytics techniques can be extremely helpful to addressing the potential and actual consequences of cyber attacks. Visual analytics, when applied to anomalous network behaviours, could provide a basis for a real-time indications and warnings system usable for supposed cyber incidents. Visual Analytics arose in the post nine-eleven eras in order to provide tools to the analyst to aid in the identification of threats. It was formulated primarily by experts from the field of information visualization and emphasized visual tools for information understanding and extracting patterns. (en)
Title
  • Visual Analytics Applied To Cyber Security
  • Visual Analytics Applied To Cyber Security (en)
skos:prefLabel
  • Visual Analytics Applied To Cyber Security
  • Visual Analytics Applied To Cyber Security (en)
skos:notation
  • RIV/60162694:G43__/13:00498240!RIV14-MO0-G43_____
http://linked.open...avai/riv/aktivita
http://linked.open...avai/riv/aktivity
  • I
http://linked.open...iv/cisloPeriodika
  • 11/2013
http://linked.open...vai/riv/dodaniDat
http://linked.open...aciTvurceVysledku
http://linked.open.../riv/druhVysledku
http://linked.open...iv/duvernostUdaju
http://linked.open...titaPredkladatele
http://linked.open...dnocenehoVysledku
  • 114182
http://linked.open...ai/riv/idVysledku
  • RIV/60162694:G43__/13:00498240
http://linked.open...riv/jazykVysledku
http://linked.open.../riv/klicovaSlova
  • visual analytics; cyber threats; network traffic; human visual perceptual process; visual tools and technologies; patterns; decision-making process; big data; cyber-crime; graphics (en)
http://linked.open.../riv/klicoveSlovo
http://linked.open...odStatuVydavatele
  • CZ - Česká republika
http://linked.open...ontrolniKodProRIV
  • [A4C8C8689505]
http://linked.open...i/riv/nazevZdroje
  • Cybernetic Letters
http://linked.open...in/vavai/riv/obor
http://linked.open...ichTvurcuVysledku
http://linked.open...cetTvurcuVysledku
http://linked.open...UplatneniVysledku
http://linked.open...v/svazekPeriodika
  • Neuveden
http://linked.open...iv/tvurceVysledku
  • Malý, Vlastimil
issn
  • 1802-3525
number of pages
http://localhost/t...ganizacniJednotka
  • G43
Faceted Search & Find service v1.16.118 as of Jun 21 2024


Alternative Linked Data Documents: ODE     Content Formats:   [cxml] [csv]     RDF   [text] [turtle] [ld+json] [rdf+json] [rdf+xml]     ODATA   [atom+xml] [odata+json]     Microdata   [microdata+json] [html]    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3240 as of Jun 21 2024, on Linux (x86_64-pc-linux-gnu), Single-Server Edition (126 GB total memory, 48 GB memory in use)
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2024 OpenLink Software