Reflecting on the use of sonification for network monitoring
In Security Operations Centres (SOCs), computer networks are generally monitored using a combination of anomaly detection techniques, Intrusion Detection Systems (IDS) and data presented in visual and text-based forms. In the last two decades significant progress has been made in developing novel so...
Autores principales: | Axon, L, Creese, S, Goldsmith, M, Nurse, J |
---|---|
Formato: | Conference item |
Publicado: |
ThinkMind
2016
|
Ejemplares similares
-
A formalised approach to designing sonification systems for network-security monitoring
por: Axon, L, et al.
Publicado: (2017) -
Sonification for network-security monitoring
por: Axon, L
Publicado: (2018) -
Sonification to support the monitoring tasks of security operations centres
por: Axon, L, et al.
Publicado: (2019) -
Sonification in security operations centres: what do security practitioners think?
por: Axon, L, et al.
Publicado: (2018) -
Sonification mappings: Estimating effectiveness, polarities and scaling in an online experiment
por: Axon, L, et al.
Publicado: (2018)