Reflecting on the use of sonification for network monitoring
In Security Operations Centres (SOCs), computer networks are generally monitored using a combination of anomaly detection techniques, Intrusion Detection Systems (IDS) and data presented in visual and text-based forms. In the last two decades significant progress has been made in developing novel so...
Main Authors: | Axon, L, Creese, S, Goldsmith, M, Nurse, J |
---|---|
Format: | Conference item |
Published: |
ThinkMind
2016
|
Similar Items
-
A formalised approach to designing sonification systems for network-security monitoring
by: Axon, L, et al.
Published: (2017) -
Sonification for network-security monitoring
by: Axon, L
Published: (2018) -
Sonification to support the monitoring tasks of security operations centres
by: Axon, L, et al.
Published: (2019) -
Sonification in security operations centres: what do security practitioners think?
by: Axon, L, et al.
Published: (2018) -
Sonification mappings: Estimating effectiveness, polarities and scaling in an online experiment
by: Axon, L, et al.
Published: (2018)