{"id":"https://openalex.org/W2111998985","doi":"https://doi.org/10.1109/isi.2013.6578842","title":"Reflecting on visualization for cyber security","display_name":"Reflecting on visualization for cyber security","publication_year":2013,"publication_date":"2013-06-01","ids":{"openalex":"https://openalex.org/W2111998985","doi":"https://doi.org/10.1109/isi.2013.6578842","mag":"2111998985"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2013.6578842","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109880287","display_name":"Carrie Gates","orcid":null},"institutions":[],"countries":["US"],"is_corresponding":false,"raw_author_name":"Carrie Gates","raw_affiliation_strings":["CA Labs., USA"],"affiliations":[{"raw_affiliation_string":"CA Labs., USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086851552","display_name":"Sophie Engle","orcid":"https://orcid.org/0000-0003-4637-2953"},"institutions":[{"id":"https://openalex.org/I76766440","display_name":"University of San Francisco","ror":"https://ror.org/029m7xn54","country_code":"US","type":"education","lineage":["https://openalex.org/I76766440"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sophie Engle","raw_affiliation_strings":["University of San Francisco, San Francisco, CA, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"University of San Francisco, San Francisco, CA, USA#TAB#","institution_ids":["https://openalex.org/I76766440"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.327,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":7,"citation_normalized_percentile":{"value":0.651264,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":83,"max":84},"biblio":{"volume":null,"issue":null,"first_page":"275","last_page":"277"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10799","display_name":"Data Visualization and Analytics","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10799","display_name":"Data Visualization and Analytics","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12720","display_name":"Multimedia Communication and Technology","score":0.9673,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.9638,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/position","display_name":"Position (finance)","score":0.42620987}],"concepts":[{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.92032003},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7096802},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.51628345},{"id":"https://openalex.org/C172367668","wikidata":"https://www.wikidata.org/wiki/Q6504956","display_name":"Data visualization","level":3,"score":0.5132396},{"id":"https://openalex.org/C185578843","wikidata":"https://www.wikidata.org/wiki/Q10609775","display_name":"Information visualization","level":3,"score":0.42700326},{"id":"https://openalex.org/C198082294","wikidata":"https://www.wikidata.org/wiki/Q3399648","display_name":"Position (finance)","level":2,"score":0.42620987},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.12256095},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.06838706},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2013.6578842","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":13,"referenced_works":["https://openalex.org/W1591593704","https://openalex.org/W1598207589","https://openalex.org/W1600115249","https://openalex.org/W2045999085","https://openalex.org/W2055821558","https://openalex.org/W2058203255","https://openalex.org/W2111726016","https://openalex.org/W2115759937","https://openalex.org/W2120857677","https://openalex.org/W2168440500","https://openalex.org/W2541239357","https://openalex.org/W2542318691","https://openalex.org/W2542551654"],"related_works":["https://openalex.org/W4225274103","https://openalex.org/W2923661510","https://openalex.org/W2547096368","https://openalex.org/W2520625499","https://openalex.org/W2295030662","https://openalex.org/W2147893003","https://openalex.org/W2105200106","https://openalex.org/W2035418841","https://openalex.org/W1938514595","https://openalex.org/W1574055964"],"abstract_inverted_index":{"In":[0],"this":[1],"short":[2],"position":[3],"paper,":[4],"we":[5],"explore":[6],"three":[7],"questions":[8],"regarding":[9],"cyber":[10,15,33,40],"security":[11,16,41],"visualization:":[12],"(1)":[13],"why":[14],"visualization":[17,28],"has":[18],"not":[19],"been":[20],"more":[21],"effective":[22],"in":[23,32],"the":[24],"past,":[25],"(2)":[26],"how":[27,37],"can":[29],"be":[30],"utilized":[31],"security,":[34],"and":[35],"(3)":[36],"to":[38],"evaluate":[39],"visualization.":[42]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2111998985","counts_by_year":[{"year":2023,"cited_by_count":3},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2024-12-10T23:49:22.435477","created_date":"2016-06-24"}