Energy Data Visualizations on Smartphones for Triggering Behavioral Change: Novel Vs. Conventional
Authors:
Ayman Al-Kababji,
Abdullah Alsalemi,
Yassine Himeur,
Faycal Bensaali,
Abbes Amira,
Rachael Fernandez,
Noora Fetais
Abstract:
This paper conveys the importance of using suitable data visualizations for electrical energy consumption and the effect it carries on reducing said consumption. Data visualization tools construct an important pillar in energy micro-moments, i.e., the concept of providing the right information at the right time in the right way for a specific power consumer. Such behavioral change can be triggered…
▽ More
This paper conveys the importance of using suitable data visualizations for electrical energy consumption and the effect it carries on reducing said consumption. Data visualization tools construct an important pillar in energy micro-moments, i.e., the concept of providing the right information at the right time in the right way for a specific power consumer. Such behavioral change can be triggered with the help of good recommendations and suitable visualizations to convey the right message. A questionnaire is built as a mobile application to evaluate different groups of conventional and novel visualizations. Conventional charts are restricted to bar, line and stacked area charts, while novel visualizations contain heatmap, spiral and appliance-level stacked bar charts. Significant findings gathered from participants' responses indicate that they are slightly inclined towards conventional charts. However, their understanding of the novel charts is better by 8% when the analysis questions are investigated. Finally, a question is answered on whether a group of visualizations should be discarded completely, or some modifications can be applied.
△ Less
Submitted 8 October, 2020;
originally announced October 2020.
CloudSafe: A Tool for an Automated Security Analysis for Cloud Computing
Authors:
Seoungmo An,
Taehoon Eom,
Jong Sou Park,
** B. Hong,
Armstrong Nhlabatsi,
Noora Fetais,
Khaled M. Khan,
Dong Seong Kim
Abstract:
Cloud computing has been adopted widely, providing on-demand computing resources to improve perfornance and reduce the operational costs. However, these new functionalities also bring new ways to exploit the cloud computing environment. To assess the security of the cloud, graphical security models can be used, such as Attack Graphs and Attack Trees. However, existing models do not consider all ty…
▽ More
Cloud computing has been adopted widely, providing on-demand computing resources to improve perfornance and reduce the operational costs. However, these new functionalities also bring new ways to exploit the cloud computing environment. To assess the security of the cloud, graphical security models can be used, such as Attack Graphs and Attack Trees. However, existing models do not consider all types of threats, and also automating the security assessment functions are difficult. In this paper, we propose a new security assessment tool for the cloud named CloudSafe, an automated security assessment for the cloud. The CloudSafe tool collates various tools and frameworks to automate the security assessment process. To demonstrate the applicability of the CloudSafe, we conducted security assessment in Amazon AWS, where our experimental results showed that we can effectively gather security information of the cloud and carry out security assessment to produce security reports. Users and cloud service providers can use the security report generated by the CloudSafe to understand the security posture of the cloud being used/provided.
△ Less
Submitted 11 March, 2019;
originally announced March 2019.