Skip to main content

Adaptive Touch Interface: Application for Mobile Internet Security

  • Conference paper
  • First Online:
  • 280 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1121))

Abstract

In modern means of mobile Internet security, including those based on touch screens, various visualization models are used. However, with the increasing complexity of these models, the requirements for models of user interaction with visualization change, the need for their adaptability increases. The article proposes an adaptive approach to the formation of a user interface based on touch screens for managing mobile Internet security. The results of experiments on user interaction with visualization of a centralized and decentralized network of devices and user perception of certain gestures when using touch screens are also shown. The problems and advantages of this type of interface, identified during the tests are described.

Supported by the grant of RFBR 18-07-01488-a in SPIIRAS.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Apple | use multi-touch gestures on your Mac - Apple support. https://support.apple.com/en-us/HT204895. Accessed June 2019

  2. Apple developer | gestures - user interaction - IOS - human interface guidelines. https://developer.apple.com/design/human-interface-guidelines/ios/user-interaction/gestures/. Accessed June 2019

  3. Apple developer | UI design dos and donts. https://developer.apple.com/design/tips/. Accessed June 2019

  4. kolenda, N.: Psychology and business. https://www.nickkolenda.com/user-experience/#. Accessed June 2019

  5. World Usability Congress: Touch screen usability best practices when designing automation user interfaces (UI). https://worldusabilitycongress.com/touch-screen-usability-best-practices-when-designing-automation-user-interfaces-ui/. Accessed June 2019

  6. Ananto, B.S., Sari, R.F., Harwahyu, R.: Color transformation for color blind compensation on augmented reality system. In: 2011 International Conference on User Science and Engineering (i-USEr), pp. 129–134. IEEE (2011)

    Google Scholar 

  7. Best, D.M., Bohn, S., Love, D., Wynne, A., Pike, W.A.: Real-time visualization of network behaviors for situational awareness. In: Proceedings of the 7th International Symposium on Visualization for Cyber Security, pp. 79–90. ACM (2010)

    Google Scholar 

  8. Bishop, M.: Conspiracy and information flow in the take-grant protection model. J. Comput. Secur. 4(4), 331–359 (1996)

    Article  Google Scholar 

  9. Choi, H., Lee, H., Kim, H.: Fast detection and visualization of network attacks on parallel coordinates. Comput. Secur. 28(5), 276–288 (2009)

    Article  Google Scholar 

  10. Desnitsky, V., Levshun, D., Chechulin, A., Kotenko, I.V.: Design technique for secure embedded devices: application for creation of integrated cyber-physical security system. JoWUA 7(2), 60–80 (2016)

    Google Scholar 

  11. Heitzmann, A., Palazzi, B., Papamanthou, C., Tamassia, R.: Effective visualization of file system access-control. In: Goodall, J.R., Conti, G., Ma, K.-L. (eds.) VizSec 2008. LNCS, vol. 5210, pp. 18–25. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-85933-8_2

    Chapter  Google Scholar 

  12. Hutchins, E.L., Hollan, J.D., Norman, D.A.: Direct manipulation interfaces. Hum. Comput. Interact. 1(4), 311–338 (1985)

    Article  Google Scholar 

  13. Ingols, K., Lippmann, R., Piwowarski, K.: Practical attack graph generation for network defense. In: 2006 22nd Annual Computer Security Applications Conference, ACSAC 2006, pp. 121–130. IEEE (2006)

    Google Scholar 

  14. Kim, D.-K., Ray, I., France, R., Li, N.: Modeling role-based access control using parameterized UML models. In: Wermelinger, M., Margaria-Steffen, T. (eds.) FASE 2004. LNCS, vol. 2984, pp. 180–193. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24721-0_13

    Chapter  Google Scholar 

  15. Kolomeec, M., Chechulin, A., Kotenko, I.V.: Methodological primitives for phased construction of data visualization models. J. Internet Serv. Inf. Secur. 5(4), 60–84 (2015)

    Google Scholar 

  16. Kolomeec, M., Chechulin, A., Pronoza, A., Kotenko, I.V.: Technique of data visualization: example of network topology display for security monitoring. JoWUA 7(1), 58–78 (2016)

    Google Scholar 

  17. Kolomeec, M., et al.: Choosing models for security metrics visualization. In: Rak, J., Bay, J., Kotenko, I., Popyack, L., Skormin, V., Szczypiorski, K. (eds.) MMM-ACNS 2017. LNCS, vol. 10446, pp. 75–87. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-65127-9_7

    Chapter  Google Scholar 

  18. Kolomeets, M., Chechulin, A., Kotenko, I., Saenko, I.: Access control visualization using triangular matrices. In: 2019 27th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), pp. 348–355. IEEE (2019)

    Google Scholar 

  19. Kolomeets, M., Chechulin, A., Kotenko, I., Strecker, M.: Voronoi maps for planar sensor networks visualization. In: You, I., Chen, H.-C., Sharma, V., Kotenko, I. (eds.) MobiSec 2017. CCIS, vol. 971, pp. 96–109. Springer, Singapore (2019). https://doi.org/10.1007/978-981-13-3732-1_7

    Chapter  Google Scholar 

  20. Kotenko, I., Doynikova, E.: Security assessment of computer networks based on attack graphs and security events. In: Linawati, M.M.S., Neuhold, E.J., Tjoa, A.M., You, I. (eds.) ICT-EurAsia 2014. LNCS, vol. 8407. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-642-55032-4_47

    Chapter  Google Scholar 

  21. Kotenko, I., Stepashkin, M., Doynikova, E.: Security analysis of information systems taking into account social engineering attacks. In: 2011 19th International Euromicro Conference on Parallel, Distributed and Network-Based Processing, pp. 611–618. IEEE (2011)

    Google Scholar 

  22. Kotenko, I., Ulanov, A.: Simulation of internet DDoS attacks and defense. In: Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol. 4176, pp. 327–342. Springer, Heidelberg (2006). https://doi.org/10.1007/11836810_24

    Chapter  Google Scholar 

  23. Roberts, J.C.: Guest editor’s introduction: special issue on coordinated and multiple views in exploratory visualization. Inf. Vis. 2(4), 199–200 (2003)

    Article  Google Scholar 

  24. Sarkar, M., Brown, M.H.: Graphical fisheye views. Commun. ACM 37(12), 73–83 (1994)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Maxim Kolomeets .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhernova, K., Kolomeets, M., Kotenko, I., Chechulin, A. (2020). Adaptive Touch Interface: Application for Mobile Internet Security. In: You, I., Chen, HC., Leu, FY., Kotenko, I. (eds) Mobile Internet Security. MobiSec 2019. Communications in Computer and Information Science, vol 1121. Springer, Singapore. https://doi.org/10.1007/978-981-15-9609-4_5

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-9609-4_5

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-9608-7

  • Online ISBN: 978-981-15-9609-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics