Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
visualization design and evaluation methods (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(1/98)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article EST
/
book article ENG
Mental model mapping method for cybersecurity
Kullman, Kaur
;
Buchanan, Laurin
;
Komlodi, Anita
;
Engel, Don
HCI for Cybersecurity, Privacy and Trust : Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020 : Proceedings
2020
/
p. 458-470
https://doi.org/10.1007/978-3-030-50309-3_30
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
Related publications
1
Interactive stereoscopically perceivable multidimensional data visualizations for cybersecurity = Interaktiivsed, ruumiliselt tajutavad, mitmemõõtelised andmekuvad küberturbele
Number of records 1, displaying
1 - 1
keyword
98
1.
visualization design and evaluation methods
2.
design evaluation
3.
shelter design evaluation
4.
computational design methods
5.
Design and assessment methods
6.
design methods
7.
data flow visualization
8.
data visualization
9.
information visualization
10.
medical visualization
11.
Network visualization
12.
real-time visualization
13.
scientific visualization
14.
Topology visualization
15.
visualization
16.
visualization of law
17.
3D network topology visualization
18.
3D visualization
19.
design methodology and human-centred design
20.
accuracy evaluation
21.
answer evaluation
22.
Automated Bonding Evaluation System
23.
automatic evaluation
24.
binding evaluation
25.
clinical evaluation
26.
cohesion policy evaluation
27.
comprehensive evaluation
28.
compression method evaluation
29.
critical evaluation
30.
decision-making trial and evaluation laboratory
31.
descriptive sensory evaluation
32.
empirical evaluation
33.
Energy-based evaluation
34.
enhanced economy evaluation
35.
environmental evaluation
36.
environmental hazard evaluation
37.
ethical evaluation
38.
evaluation
39.
evaluation framework
40.
evaluation metrics
41.
evaluation of companies
42.
Evaluation of Explainability
43.
evaluation of explainable AI intrusion detection
44.
evaluation of the results of environmental innovations
45.
experimental evaluation
46.
feasibility evaluation
47.
financial evaluation
48.
function evaluation
49.
hazard evaluation
50.
Integrated hedonic-utilitarian evaluation
51.
investment effectiveness evaluation
52.
investment evaluation
53.
investments profitability evaluation
54.
life cycle evaluation
55.
meta-evaluation
56.
microstructure evaluation
57.
model evaluation
58.
multi-criteria evaluation
59.
non destructive evaluation
60.
non-destructive evaluation
61.
numerical evaluation of the order of convergence
62.
Organizational performance evaluation
63.
parameter evaluation
64.
performance evaluation
65.
performance evaluation and comparison
66.
petroleum reservoir evaluation
67.
Platform Evaluation
68.
point of evaluation
69.
policy evaluation
70.
process evaluation
71.
production performance evaluation system
72.
qualitative evaluation
73.
quality evaluation of scientific information
74.
reliability evaluation
75.
RIS3 evaluation and monitoring
76.
risk evaluation model
77.
risk evaluation model development
78.
Security evaluation
79.
security evaluation instruments
80.
Security Level Evaluation
81.
self-evaluation
82.
sensory evaluation
83.
Software engineering methodology evaluation
84.
source rock evaluation
85.
student evaluation
86.
students' evaluation and feedback
87.
system evaluation
88.
system-level evaluation
89.
tender evaluation model
90.
test and evaluation platform
91.
total evaluation of complexity
92.
total evaluation of performance
93.
trajectory evaluation
94.
ultrasonic nondestructive evaluation
95.
urban environmental evaluation
96.
user evaluation
97.
web usability evaluation
98.
“Evaluation-hesitance”
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT