International audienceWith the increasing number of connected devices and given the complexity of computer networks, to identify cyber anomalies is more and more challenging. Either at home, in the work place or for military defense purposes a better cyber situation awarenness is needed. However, the visualization methods are often made for specialists and the information difficult to interpret. In this paper we describe an object made for the visualization of abnormal network events in a user friendly way using colors, sound and information scrolling. It is still under development but the first user feedbacks are encouraging
Network security is the complicated field of controlling access within a computer network. One of th...
Figure 1: The overview of web-based visualization tool for analyzing the network and system anomalie...
With an ever increasing number of attacks on networks that have an even more increasing amount of in...
International audienceWith the increasing number of connected devices and given the complexity of co...
The timely and reliable data transfer required by many networked applications necessitates the devel...
Effective visual analysis of computer network defense (CND) information is challenging due to the vo...
Network security manager are faced with a rapidly changing and complex threat environment due to the...
International audienceThis paper aims to assess the usefulness of 3D interactive interfaces to displ...
International audienceAs networks increase in size and complexity, IT security officers are being ov...
Abstract The ever-increasing amount of major security incidents has led to an emerging interest in c...
More than ever, we rely on computer systems and the availability of computer networks. It is crucial...
Abstract. With the rapid growth of networks in size and complexity, netwok administrators today are ...
The amount of cyberattacks in Germany increased over the last years but many small and medium-sized ...
Today, enormous logging data monitoring the traffics of the Internet is generated everyday. However,...
Traditional risk management produces a rather static listing of weaknesses, probabilities and mitiga...
Network security is the complicated field of controlling access within a computer network. One of th...
Figure 1: The overview of web-based visualization tool for analyzing the network and system anomalie...
With an ever increasing number of attacks on networks that have an even more increasing amount of in...
International audienceWith the increasing number of connected devices and given the complexity of co...
The timely and reliable data transfer required by many networked applications necessitates the devel...
Effective visual analysis of computer network defense (CND) information is challenging due to the vo...
Network security manager are faced with a rapidly changing and complex threat environment due to the...
International audienceThis paper aims to assess the usefulness of 3D interactive interfaces to displ...
International audienceAs networks increase in size and complexity, IT security officers are being ov...
Abstract The ever-increasing amount of major security incidents has led to an emerging interest in c...
More than ever, we rely on computer systems and the availability of computer networks. It is crucial...
Abstract. With the rapid growth of networks in size and complexity, netwok administrators today are ...
The amount of cyberattacks in Germany increased over the last years but many small and medium-sized ...
Today, enormous logging data monitoring the traffics of the Internet is generated everyday. However,...
Traditional risk management produces a rather static listing of weaknesses, probabilities and mitiga...
Network security is the complicated field of controlling access within a computer network. One of th...
Figure 1: The overview of web-based visualization tool for analyzing the network and system anomalie...
With an ever increasing number of attacks on networks that have an even more increasing amount of in...