Visualizing Cybersecurity Diagrams: An Empirical Analysis of Common Weakness Enumeration Images.
Benjamin L. SchooleyDerek HansenEthan James RichmondMalaya Jordan CaniteNimrod Max Huaira ReynaPublished in: HCI (45) (2024)
Keyphrases
- image data
- ground truth
- object recognition
- image database
- input image
- image features
- three dimensional
- image registration
- small number
- image retrieval
- image recognition
- lighting conditions
- image understanding
- image classification
- fully automatic
- segmentation method
- image pixels
- multiple images
- illumination conditions
- region of interest
- feature points
- image collections
- image matching
- medical images
- aerial images
- synthetic and real images