Fig 2 - uploaded by Kaur Kullman
Content may be subject to copyright.
Source publication
Visualizations can enhance the efficiency of Cyber Defense Analysts, Cyber Defense Incident Responders and Network Operations Specialists (Sub-ject Matter Experts, SME) by providing contextual information for various cy-bersecurity-related datasets and data sources. We propose that customized, stere-oscopic 3D visualizations, aligned with SMEs inte...
Contexts in source publication
Context 1
... Figure 2, where entities' positions on XYZ axes are determined by: Z) the group this entity belongs to (a subnet). Y) subgroup (a functional group in that subnet: servers, networks devices, workstations). ...