Bondalkunta Vishnu Vikas, Nimmagadda Skb Karthikeya, Gokavarapu Sai Chandu, G. Raja, N. Sai
{"title":"加强数据可视化在网络安全中的应用研究——快速、高效、完整","authors":"Bondalkunta Vishnu Vikas, Nimmagadda Skb Karthikeya, Gokavarapu Sai Chandu, G. Raja, N. Sai","doi":"10.1109/ICAIS56108.2023.10073891","DOIUrl":null,"url":null,"abstract":"The main motive of our research is to interpret the enhancement of the way to show the data accurately. To get acquainted with the effort that is put in during the initial stages of implementing data science applications such as data -visualization tools in analyzing the cyber data logs as cyber threats and hacking are being improved by leaps and bounds. In this, to pinpoint the usages of data about data breaches around the globe is also one of our motives. To find the usage of forensic tools after utilizing data visualization tools to the fullest extent. This paper also focuses on the aspects where the enhancement is required in the usage of data visualization. Also, to think of the next steps that are required accordingly. In recent times, as a part of awareness to the present society, developers need to let the threats that a cyber-criminal or an attacker possess be known to every network user for a better understanding of the unreadable language of the cyber logs data. Visualization tools are used to process the analyzing tasks and interpret them.","PeriodicalId":164345,"journal":{"name":"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Study of Enhancing Usage of Data Visualization in Cyber Security- Quick, Efficient, and Complete\",\"authors\":\"Bondalkunta Vishnu Vikas, Nimmagadda Skb Karthikeya, Gokavarapu Sai Chandu, G. Raja, N. Sai\",\"doi\":\"10.1109/ICAIS56108.2023.10073891\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The main motive of our research is to interpret the enhancement of the way to show the data accurately. To get acquainted with the effort that is put in during the initial stages of implementing data science applications such as data -visualization tools in analyzing the cyber data logs as cyber threats and hacking are being improved by leaps and bounds. In this, to pinpoint the usages of data about data breaches around the globe is also one of our motives. To find the usage of forensic tools after utilizing data visualization tools to the fullest extent. This paper also focuses on the aspects where the enhancement is required in the usage of data visualization. Also, to think of the next steps that are required accordingly. In recent times, as a part of awareness to the present society, developers need to let the threats that a cyber-criminal or an attacker possess be known to every network user for a better understanding of the unreadable language of the cyber logs data. Visualization tools are used to process the analyzing tasks and interpret them.\",\"PeriodicalId\":164345,\"journal\":{\"name\":\"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)\",\"volume\":\"29 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-02-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAIS56108.2023.10073891\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAIS56108.2023.10073891","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Study of Enhancing Usage of Data Visualization in Cyber Security- Quick, Efficient, and Complete
The main motive of our research is to interpret the enhancement of the way to show the data accurately. To get acquainted with the effort that is put in during the initial stages of implementing data science applications such as data -visualization tools in analyzing the cyber data logs as cyber threats and hacking are being improved by leaps and bounds. In this, to pinpoint the usages of data about data breaches around the globe is also one of our motives. To find the usage of forensic tools after utilizing data visualization tools to the fullest extent. This paper also focuses on the aspects where the enhancement is required in the usage of data visualization. Also, to think of the next steps that are required accordingly. In recent times, as a part of awareness to the present society, developers need to let the threats that a cyber-criminal or an attacker possess be known to every network user for a better understanding of the unreadable language of the cyber logs data. Visualization tools are used to process the analyzing tasks and interpret them.