{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:39:04Z","timestamp":1725899944192},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642305665"},{"type":"electronic","value":"9783642305672"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30567-2_22","type":"book-chapter","created":{"date-parts":[[2012,10,1]],"date-time":"2012-10-01T07:10:40Z","timestamp":1349075440000},"page":"262-276","source":"Crossref","is-referenced-by-count":2,"title":["Leveraging Cognitive Principles to Improve Security Visualization"],"prefix":"10.1007","author":[{"given":"Matthew","family":"Dunlop","sequence":"first","affiliation":[]},{"given":"William","family":"Urbanski","sequence":"additional","affiliation":[]},{"given":"Randy","family":"Marchany","sequence":"additional","affiliation":[]},{"given":"Joseph","family":"Tront","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Shelly, D., Dunlop, M., Marchany, R., Sforza, P.: Using geographic information systems for enhanced security visualization. In: The 1st International Conference on Computing for Geospatial Research and Application, COM. Geo. (June 2010)","DOI":"10.1145\/1823854.1823872"},{"key":"22_CR2","unstructured":"Taylor, S.M.: How much information is enough? decision-making and cognitive analysis. In: 10th International Command and Control Research and Technology Symposium (June 2005)"},{"issue":"2","key":"22_CR3","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1037\/h0043158","volume":"63","author":"G. Miller","year":"1956","unstructured":"Miller, G.: The magical number seven, plus or minus two: Some limits on our capacity for processing information. The Psychological Review\u00a063(2), 81\u201397 (1956)","journal-title":"The Psychological Review"},{"issue":"9","key":"22_CR4","doi-asserted-by":"publisher","first-page":"1383","DOI":"10.1002\/sim.1502","volume":"22","author":"E.J. Wegman","year":"2003","unstructured":"Wegman, E.J.: Visual data mining. Statistics in Medicine\u00a022(9), 1383\u20131397 (2003)","journal-title":"Statistics in Medicine"},{"key":"22_CR5","unstructured":"Snort, http:\/\/www.snort.org\/ (accessed April 2, 2010)"},{"issue":"2","key":"22_CR6","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MCG.2006.30","volume":"26","author":"G. Conti","year":"2006","unstructured":"Conti, G., Abdullah, K., Grizzard, J., Stasko, J., Copeland, J., Ahamad, M., Owen, H., Lee, C.: Countering security information overload through alert and packet visualization. IEEE Computer Graphics and Applications\u00a026(2), 60\u201370 (2006)","journal-title":"IEEE Computer Graphics and Applications"},{"issue":"4","key":"22_CR7","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1080\/10618600.1995.10474685","volume":"4","author":"E.J. Wegman","year":"1995","unstructured":"Wegman, E.J.: Huge data sets and the frontiers of computational feasibility. Journal of Computational and Graphical Statistics\u00a04(4), 281\u2013295 (1995)","journal-title":"Journal of Computational and Graphical Statistics"},{"issue":"3","key":"22_CR8","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1068\/p160389","volume":"16","author":"S.B. Steinman","year":"1987","unstructured":"Steinman, S.B.: Serial and parallel search in pattern vision? Perception\u00a016(3), 389\u2013398 (1987)","journal-title":"Perception"},{"key":"22_CR9","unstructured":"Healey, C.G.: Perception in visualization, http:\/\/www.csc.ncsu.edu\/faculty\/healey\/PP\/index.html (last updated May 11, 2009)"},{"issue":"2","key":"22_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1167\/7.2.17","volume":"7","author":"R. Rosenholtz","year":"2007","unstructured":"Rosenholtz, R., Li, Y., Nakano, L.: Measuring visual clutter. Journal of Vision\u00a07(2), 1\u201322 (2007)","journal-title":"Journal of Vision"},{"issue":"2","key":"22_CR11","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1179\/000870482787073225","volume":"19","author":"R.J. Phillips","year":"1982","unstructured":"Phillips, R.J.: An investigation of visual clutter in the topographic base of a geological map. The Cartographic Journal\u00a019(2), 122\u2013132 (1982)","journal-title":"The Cartographic Journal"},{"key":"22_CR12","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/INFVIS.2001.963274","volume-title":"INFOVIS 2001: the IEEE Symposium on Information Visualization","author":"L. Nowell","year":"2001","unstructured":"Nowell, L., Hetzler, E., Tanasse, T.: Change blindness in information visualization: A case study. In: INFOVIS 2001: the IEEE Symposium on Information Visualization, pp. 15\u201322. IEEE Computer Society, Washington, DC (2001)"},{"issue":"1","key":"22_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/135062800394658","volume":"7","author":"D.J. Simons","year":"2000","unstructured":"Simons, D.J.: Current approaches to change blindness. Visual Cognition\u00a07(1), 1\u201315 (2000)","journal-title":"Visual Cognition"},{"key":"22_CR14","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1111\/j.1467-9280.1997.tb00427.x","volume":"8","author":"R.A. Rensink","year":"1997","unstructured":"Rensink, R.A., O\u2019Regan, J.K., Clark, J.J.: To See or Not to See: The Need for Attention to Perceive Changes in Scenes. Psychological Science\u00a08, 368\u2013373 (1997)","journal-title":"Psychological Science"},{"key":"22_CR15","unstructured":"Rensink, R.A.: The need for attention to see change, http:\/\/www.psych.ubc.ca\/~rensink\/flicker\/index.html (accessed April 25, 2010)"},{"issue":"7-8","key":"22_CR16","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/BF02994844","volume":"55","author":"A. Patcha","year":"2000","unstructured":"Patcha, A., Park, J.M.: A revised taxonomy for intrusion-detection systems. Annals of Telecommunications\u00a055(7-8), 361\u2013378 (2000)","journal-title":"Annals of Telecommunications"},{"key":"22_CR17","unstructured":"Kasemsri, R.R.: A Survey, Taxonomy, and Analysis of Network Security Visualization Techniques. Master\u2019s thesis, Georgia State University (2005)"},{"issue":"12","key":"22_CR18","doi-asserted-by":"publisher","first-page":"3448","DOI":"10.1016\/j.comnet.2007.02.001","volume":"51","author":"A. Patcha","year":"2007","unstructured":"Patcha, A., Park, J.M.: An overview of anomaly detection techniques: Existing solutions and latest technological trends. Computer Networks\u00a051(12), 3448\u20133470 (2007)","journal-title":"Computer Networks"},{"key":"22_CR19","unstructured":"Open Source Security Information Management (OSSIM), http:\/\/www.alienvault.com\/community.php?section=Home (accessed April 9, 2010)"},{"key":"22_CR20","unstructured":"DShield, http:\/\/www.dshield.org\/ (accessed April 9, 2010)"},{"key":"22_CR21","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1145\/1029208.1029232","volume-title":"The 2004 ACM Workshop on Visualization and Data Mining for Computer Security","author":"H. Koike","year":"2004","unstructured":"Koike, H., Ohno, K.: SnortView: visualization system of Snort logs. In: The 2004 ACM Workshop on Visualization and Data Mining for Computer Security, pp. 143\u2013147. ACM, New York (2004)"},{"key":"22_CR22","unstructured":"ArcSight ESM Enterprise Security Manager, http:\/\/www.arcsight.com\/products\/products-esm\/ (accessed April 9, 2010)"},{"key":"22_CR23","unstructured":"SnoGE, http:\/\/leonward.wordpress.com\/snoge\/ (accessed April 16, 2010)"},{"key":"22_CR24","unstructured":"RUMINT, http:\/\/www.rumint.org\/ (accessed April 16, 2010)"},{"key":"22_CR25","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1145\/1029208.1029214","volume-title":"The 2004 ACM Workshop on Visualization and Data Mining for Computer Security (VizSEC\/DMSEC 2004)","author":"X. Yin","year":"2004","unstructured":"Yin, X., Yurcik, W., Treaster, M., Li, Y., Lakkaraju, K.: VisFlowConnect: netflow visualizations of link relationships for security situational awareness. In: The 2004 ACM Workshop on Visualization and Data Mining for Computer Security (VizSEC\/DMSEC 2004), pp. 26\u201334. ACM, New York (2004)"},{"key":"22_CR26","unstructured":"AfterGlow, http:\/\/afterglow.sourceforge.net\/ (accessed April 9, 2010)"},{"key":"22_CR27","doi-asserted-by":"crossref","unstructured":"Shannon, C.E.: A mathematical theory of communications. The Bell Systems Technical Journal\u00a027 (1948)","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"22_CR28","unstructured":"Open Geospatial Consortium KML, http:\/\/www.opengeospatial.org\/standards\/kml\/ (accessed April 21, 2010)"},{"issue":"3","key":"22_CR29","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1037\/0096-1523.15.3.419","volume":"27","author":"J.M. Wolfe","year":"1989","unstructured":"Wolfe, J.M., Cave, K.R., Franzel, S.L.: uided search: an alternative to the feature integration model for visual search. Journal of Experimental Psychology: Human Perception and Performance\u00a027(3), 419\u2013433 (1989)","journal-title":"Journal of Experimental Psychology: Human Perception and Performance"},{"key":"22_CR30","doi-asserted-by":"crossref","unstructured":"Woodruff, A., Landay, J., Stonebraker, M.: Constant information density in zoomable interfaces. In: The 4th International Working Conference on Advanced Visual Interfaces (AVI 1998), pp. 57\u201365 (1998)","DOI":"10.1145\/948496.948505"},{"key":"22_CR31","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"784","DOI":"10.1007\/3-540-44469-6_73","volume-title":"Database and Expert Systems Applications","author":"I.D. Stroe","year":"2000","unstructured":"Stroe, I.D., Rundensteiner, E.A., Ward, M.O.: Scalable Visual Hierarchy Exploration. In: Ibrahim, M., K\u00fcng, J., Revell, N. (eds.) DEXA 2000. LNCS, vol.\u00a01873, pp. 784\u2013793. Springer, Heidelberg (2000)"},{"volume-title":"The human-computer interaction handbook: fundamentals, evolving technologies and emerging applications","year":"2003","key":"22_CR32","unstructured":"Jacko, J.A., Sears, A. (eds.): The human-computer interaction handbook: fundamentals, evolving technologies and emerging applications. L. Erlbaum Associates Inc., Hillsdale (2003)"}],"container-title":["Communications in Computer and Information Science","Networked Digital Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30567-2_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,29]],"date-time":"2024-04-29T22:52:29Z","timestamp":1714431149000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30567-2_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642305665","9783642305672"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30567-2_22","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}