Author of the publication

Glyph Visualization: A Fail-Safe Design Scheme Based on Quasi-Hamming Distances.

, , , and . IEEE Computer Graphics and Applications, 37 (2): 31-41 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Visualizing multiple error-sensitivity fields for single camera positioning., , , , , and . Comput. Vis. Sci., 15 (6): 303-317 (2012)Glyph Visualization: A Fail-Safe Design Scheme Based on Quasi-Hamming Distances., , , and . IEEE Computer Graphics and Applications, 37 (2): 31-41 (2017)Towards a User and Role-based Sequential Behavioural Analysis Tool for Insider Threat Detection., , , and . J. Internet Serv. Inf. Secur., 4 (4): 127-137 (2014)Glyph Sorting: Interactive Visualization for Multi-dimensional Data, , , , , , and . CoRR, (2013)A Critical Reflection on the Threat from Human Insiders - Its Nature, Industry Perceptions, and Detection Approaches., , , , , , , , and . HCI (24), volume 8533 of Lecture Notes in Computer Science, page 270-281. Springer, (2014)MatchPad: Interactive Glyph-Based Visualization for Real-Time Sports Performance Analysis., , , , , , and . Comput. Graph. Forum, 31 (3pt4): 1255-1264 (2012)Understanding Insider Threat: A Framework for Characterising Attacks., , , , , , and . IEEE Symposium on Security and Privacy Workshops, page 214-228. IEEE Computer Society, (2014)Glyph sorting: Interactive visualization for multi-dimensional data., , , , , , and . Inf. Vis., 14 (1): 76-90 (2015)Guest Editorial: Emerging Trends in Research for Insider Threat Detection., , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 5 (2): 1-6 (2014)Visual Analytics for Non-Expert Users in Cyber Situation Awareness.. Int. J. Cyber Situational Aware., 1 (1): 54-73 (2016)