This HTML5 document contains 44 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n17http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F60162694%3AG43__%2F13%3A00498240%21RIV14-MO0-G43_____/
dctermshttp://purl.org/dc/terms/
n13http://localhost/temp/predkladatel/
n10http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n14http://linked.opendata.cz/ontology/domain/vavai/
shttp://schema.org/
skoshttp://www.w3.org/2004/02/skos/core#
rdfshttp://www.w3.org/2000/01/rdf-schema#
n3http://linked.opendata.cz/ontology/domain/vavai/riv/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n4http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n16http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n12http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n6http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n18http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n9http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n5http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F60162694%3AG43__%2F13%3A00498240%21RIV14-MO0-G43_____
rdf:type
skos:Concept n14:Vysledek
rdfs:seeAlso
http://vavtest.unob.cz/registr
dcterms:description
The field of Visual Analytics (VA) seeks to combine computational power, visual display, and human capabilities in order to extract knowledge from large, heterogeneous data sets. VA is in part a response to the scale and complexity of information that is now potentially available. It seeks to aid people in making sense of the world by helping them identify and exploit relevant information. Within the field of VA we are trying to exploit and enable the considerable capabilities of the human visual perceptual process. Visual analytics techniques can be extremely helpful to addressing the potential and actual consequences of cyber attacks. Visual analytics, when applied to anomalous network behaviours, could provide a basis for a real-time indications and warnings system usable for supposed cyber incidents. Visual Analytics arose in the post nine-eleven eras in order to provide tools to the analyst to aid in the identification of threats. It was formulated primarily by experts from the field of information visualization and emphasized visual tools for information understanding and extracting patterns. The field of Visual Analytics (VA) seeks to combine computational power, visual display, and human capabilities in order to extract knowledge from large, heterogeneous data sets. VA is in part a response to the scale and complexity of information that is now potentially available. It seeks to aid people in making sense of the world by helping them identify and exploit relevant information. Within the field of VA we are trying to exploit and enable the considerable capabilities of the human visual perceptual process. Visual analytics techniques can be extremely helpful to addressing the potential and actual consequences of cyber attacks. Visual analytics, when applied to anomalous network behaviours, could provide a basis for a real-time indications and warnings system usable for supposed cyber incidents. Visual Analytics arose in the post nine-eleven eras in order to provide tools to the analyst to aid in the identification of threats. It was formulated primarily by experts from the field of information visualization and emphasized visual tools for information understanding and extracting patterns.
dcterms:title
Visual Analytics Applied To Cyber Security Visual Analytics Applied To Cyber Security
skos:prefLabel
Visual Analytics Applied To Cyber Security Visual Analytics Applied To Cyber Security
skos:notation
RIV/60162694:G43__/13:00498240!RIV14-MO0-G43_____
n3:aktivita
n12:I
n3:aktivity
I
n3:cisloPeriodika
11/2013
n3:dodaniDat
n5:2014
n3:domaciTvurceVysledku
n10:5937590
n3:druhVysledku
n9:J
n3:duvernostUdaju
n16:S
n3:entitaPredkladatele
n17:predkladatel
n3:idSjednocenehoVysledku
114182
n3:idVysledku
RIV/60162694:G43__/13:00498240
n3:jazykVysledku
n6:eng
n3:klicovaSlova
visual analytics; cyber threats; network traffic; human visual perceptual process; visual tools and technologies; patterns; decision-making process; big data; cyber-crime; graphics
n3:klicoveSlovo
n4:visual%20analytics n4:graphics n4:human%20visual%20perceptual%20process n4:decision-making%20process n4:visual%20tools%20and%20technologies n4:network%20traffic n4:big%20data n4:cyber%20threats n4:cyber-crime n4:patterns
n3:kodStatuVydavatele
CZ - Česká republika
n3:kontrolniKodProRIV
[A4C8C8689505]
n3:nazevZdroje
Cybernetic Letters
n3:obor
n18:KA
n3:pocetDomacichTvurcuVysledku
1
n3:pocetTvurcuVysledku
1
n3:rokUplatneniVysledku
n5:2013
n3:svazekPeriodika
Neuveden
n3:tvurceVysledku
Malý, Vlastimil
s:issn
1802-3525
s:numberOfPages
6
n13:organizacniJednotka
G43