{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:34:38Z","timestamp":1725467678221},"publisher-location":"Boston","reference-count":25,"publisher":"Kluwer Academic Publishers","isbn-type":[{"type":"print","value":"038733405X"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-387-33406-8_24","type":"book-chapter","created":{"date-parts":[[2006,7,24]],"date-time":"2006-07-24T04:55:55Z","timestamp":1153716955000},"page":"284-295","source":"Crossref","is-referenced-by-count":0,"title":["VisFlowCluster-IP: Connectivity-Based Visual Clustering of Network Hosts"],"prefix":"10.1007","author":[{"given":"Xiaoxin","family":"Yin","sequence":"first","affiliation":[]},{"given":"William","family":"Yurcik","sequence":"additional","affiliation":[]},{"given":"Adam","family":"Slagell","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"S. Axelsson. Visualisation for Intrusion Detection-Hooking the Worm. Eighth European Symposium on Research in Computer Security (ESORICS), Lecture Notes in Computer Science (LNCS) 2808, Springer, 2003.","DOI":"10.1007\/978-3-540-39650-5_18"},{"key":"24_CR2","doi-asserted-by":"crossref","unstructured":"R. Ball, G. A. Fink, C. North. Home-Centric Visualization of Network Traffic for Security Administration. ACM CCS Workshop on Visualization and Data Mining for Computer Security (VizSEC\/DMSEC), 2004.","DOI":"10.1145\/1029208.1029217"},{"issue":"1","key":"24_CR3","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/2945.468391","volume":"1","author":"R. Becker","year":"1995","unstructured":"R. Becker, S. Eick, A. Wilks. Visualizing network data. IEEE Transactions on Visualization and Computer Graphics, 1(1):16\u201328, 1995.","journal-title":"IEEE Transactions on Visualization and Computer Graphics"},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"G. Conti, K. Abdullah. Passive Visual Fingerprinting of Network Attack Tools. ACM CCS Workshop on Visualization and Data Mining for Computer Security (VizSEC\/DMSEC), 2004.","DOI":"10.1145\/1029208.1029216"},{"issue":"4","key":"24_CR5","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/245882.245901","volume":"25","author":"K. Cox","year":"1996","unstructured":"K. Cox, S. Eick, T. He. 3D Geographic Network Displays. ACMSIGMOD Record, 25(4):50\u201354, 1996.","journal-title":"ACMSIGMOD Record"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"F. Cuppens, A. Miege. Alert Correlation in a Cooperative Intrusion Detection Framework. IEEE Symp. on Security and Privacy, 2002.","DOI":"10.1109\/SECPRI.2002.1004372"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"H. Debar, A. Wespi. Aggregation and Correlation of Intrusion Detection Alerts. Int\u2019l. Symp. on Recent Advances in Intrusion Detection (RAID), 2001.","DOI":"10.1007\/3-540-45474-8_6"},{"key":"24_CR8","unstructured":"M. Dodge, R. Kitchin. Atlas of Cyberspace. Addison-Wesley, 2001."},{"key":"24_CR9","first-page":"149","volume":"42","author":"P. Eades","year":"1984","unstructured":"P. Eades. A Heuristic for Graph-Drawing. Congressus Numerantium, Vol 42, pp 149\u2013160, 1984.","journal-title":"Congressus Numerantium"},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"S. Eick, G. Wills. Navigating Large Networks with Hierarchies. IEEE Visualization, 1993.","DOI":"10.1109\/VISUAL.1993.398870"},{"issue":"1","key":"24_CR11","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/38.974517","volume":"22","author":"R. Erbacher","year":"2002","unstructured":"R. Erbacher, K. Walker, D. Frincke. Intrusion and Misuse Detection in Large-Scale Systems. IEEE Comp. Graphics and Applications, 22(1):38\u201348, 2002.","journal-title":"IEEE Comp. Graphics and Applications"},{"key":"24_CR12","unstructured":"M. Ester, H.-P. Kriegel, J. Sander, X. Xu. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise. ACM Int\u2019l. Conf. on Knowledge Discovery and Data Mining (KDD), 1996."},{"key":"24_CR13","doi-asserted-by":"crossref","first-page":"1129","DOI":"10.1002\/spe.4380211102","volume":"21","author":"T. Fruchterman","year":"1991","unstructured":"T. Fruchterman, E. Reingold. Graph-Drawing by Force-Directed Placement. Software-Practice and Experience, Vol 21, pp 1129\u20131164, 1991.","journal-title":"Software-Practice and Experience"},{"key":"24_CR14","unstructured":"C. Krugel, T. Toth, C. Keren Decentralized Event Correlation for Intrusion Detection. Int\u2019l. Conf. on Info. Sec. and Cryptology (ICISC), 2001."},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"C. Krugel, T. Toth, E. Kirda. Service Specific Anomaly Detection for Network Intrusion Detection. ACM Symp. on Applied Computing, 2002.","DOI":"10.1145\/508791.508835"},{"key":"24_CR16","doi-asserted-by":"crossref","unstructured":"K. Lakkaraju, W. Yurcik, A. J. Lee, R. Bearavolu, Y. Li, X. Yin. NVisionIP: NetFlow Visualizations of System State for Security Situational Awareness\u201d ACM CCS Workshop on Visualization and Data Mining for Computer Security (VizSEC\/DMSEC), 2004.","DOI":"10.1145\/1029208.1029219"},{"key":"24_CR17","unstructured":"W. Lee, D. Xiang. Information-Theoretic Measures for Anomaly Detection. IEEE Symp. on Security and Privacy, 2001."},{"key":"24_CR18","unstructured":"W. Lee, S. J. Stolfo, K. W. Mok. A Data Mining Framework for Building Intrusion Detection Models. IEEE Symp. on Security and Privacy, 1999."},{"key":"24_CR19","doi-asserted-by":"crossref","unstructured":"A. Noack. An Energy Model for Visual Graph Clustering. Graph Drawing, 2003.","DOI":"10.1007\/978-3-540-24595-7_40"},{"key":"24_CR20","unstructured":"S. T. Teoh et al. Elisha: a Visual-based Anomaly Detection System. Int\u2019l. Symp. on Recent Advances in Intrusion Detection (RAID), 2002."},{"key":"24_CR21","unstructured":"S. T. Teoh, K. Ma, S. F. Wu. A Visual Exploration Process for the Analysis of Internet Routing Data. IEEE Visualization, 2003."},{"key":"24_CR22","unstructured":"S. T. Teoh, K. Ma, S. F. Wu, X. Zhao. Case Study: Internet Visualization for Internet Security. IEEE Visualization, 2002."},{"key":"24_CR23","unstructured":"J. T\u00f6lle, O. Niggemann. Supporting Intrusion Detection by Graph Clustering and Graph Drawing. Int\u2019l. Symp. on Recent Advances in Intrusion Detection (RAID), 2000."},{"key":"24_CR24","doi-asserted-by":"crossref","unstructured":"F. van Ham, J. J. van Wijk. Interactive Visualization of Small World Graphs. IEEE Info Vis, 2004.","DOI":"10.1109\/INFVIS.2004.43"},{"key":"24_CR25","unstructured":"X. Yin, W. Yurcik, A. Slagell. The Design of VisFlowConnect-IP: a Link Analysis System for IP Security Situational Awareness. IEEE Int\u2019l. Workshop on Information Assurance (IWIA), 2005."}],"container-title":["IFIP International Federation for Information Processing","Security and Privacy in Dynamic Environments"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-33406-8_24.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T15:17:23Z","timestamp":1605626243000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-33406-8_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["038733405X"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/0-387-33406-8_24","relation":{},"subject":[]}}