Author of the publication

Tudumi: Information Visualization System for Monitoring and Auditing Computer Logs.

, and . IV, page 570-576. IEEE Computer Society, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extended PIN Authentication Scheme Allowing Multi-Touch Key Input., and . MoMM, page 307. ACM, (2013)Exploring alternative security warning dialog for attracting user attention: evaluation of "Kawaii" effect and its additional stimulus combination., and . iiWAS, page 582-586. ACM, (2017)Client-oriented web alteration detection system using link change state of a web page based on past and current page content., and . iiWAS, page 84:1-84:5. ACM, (2015)NIGELOG: Protecting Logging Information by Hiding Multiple Backups in Directories., and . DEXA Workshop, page 874-878. IEEE Computer Society, (1999)MTAPIN: multi-touch key input enhances security of PIN authentication while keeping usability., and . Int. J. Pervasive Comput. Commun., 10 (3): 276-290 (2014)Emoji-nized log browser: visualization of server-logs by emoji for system administrators., and . AVI, page 86:1-86:3. ACM, (2018)Pict-Place Authentication: Recognition-based Graphical Password using Image Layout for Better Balance of Security and Operation Time., and . CHItaly, page 8:1-8:7. ACM, (2021)Chameleon dial: repeated camera-recording attack resilient PIN input scheme., and . UbiComp/ISWC Adjunct, page 365-368. ACM, (2015)Anomalous network communication detection system by visual pattern on a client computer., and . SAC, page 1263-1269. ACM, (2015)Giving Motivation for Using Secure Credentials through User Authentication by Game., and . AVI, page 85:1-85:3. ACM, (2020)