{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,26]],"date-time":"2024-07-26T19:51:25Z","timestamp":1722023485706},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,1,23]],"date-time":"2013-01-23T00:00:00Z","timestamp":1358899200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2014,1]]},"DOI":"10.1007\/s00607-013-0282-8","type":"journal-article","created":{"date-parts":[[2013,1,22]],"date-time":"2013-01-22T04:14:17Z","timestamp":1358828057000},"page":"27-38","source":"Crossref","is-referenced-by-count":32,"title":["Visualizing big network traffic data using frequent pattern mining and hypergraphs"],"prefix":"10.1007","volume":"96","author":[{"given":"Eduard","family":"Glatz","sequence":"first","affiliation":[]},{"given":"Stelios","family":"Mavromatidis","sequence":"additional","affiliation":[]},{"given":"Bernhard","family":"Ager","sequence":"additional","affiliation":[]},{"given":"Xenofontas","family":"Dimitropoulos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,1,23]]},"reference":[{"key":"282_CR1","doi-asserted-by":"crossref","unstructured":"Choi H, Lee H, Kim H (2009) Fast detection and visualization of network attacks on parallel coordinates. Comput Secur 28(5):276\u2013288","DOI":"10.1016\/j.cose.2008.12.003"},{"key":"282_CR2","unstructured":"Berthier R, Cukier M, Hiltunen M, Kormann D, Vesonder G, Sheleheda D (2010) Nfsight: netflow-based network awareness tool. In: Proceedings of LISA"},{"key":"282_CR3","unstructured":"Borgelt C, Wang X (2009) Sam: A split and merge algorithm for fuzzy frequent item set mining. In: Proceedings of IFSA\/EUSFLAT"},{"key":"282_CR4","doi-asserted-by":"crossref","unstructured":"Boschetti A, Salgarelli L, Muelder C, Ma K.-L (2011) Tvi: a visual querying system for network monitoring and anomaly detection. In: Proceedings of the 8th International Symposium on Visualization for Cyber, Security","DOI":"10.1145\/2016904.2016905"},{"key":"282_CR5","doi-asserted-by":"crossref","unstructured":"Brauckhoff D, Dimitropoulos X, Wagner A, Salamatian K (2009) Anomaly extraction in backbone networks using association rules. In: Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference, ACM pp 28\u201334","DOI":"10.1145\/1644893.1644897"},{"key":"282_CR6","doi-asserted-by":"crossref","unstructured":"Cirneci A, Boboc S, Leordeanu C, Cristea V, Estan C (2009) Netpy: Advanced network traffic monitoring. In: Proceedings of the 2009 International Conference on Intelligent Networking and Collaborative Systems. INCOS\u2019 09","DOI":"10.1109\/INCOS.2009.13"},{"issue":"5","key":"282_CR7","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MCG.2007.137","volume":"27","author":"AD D\u2019Amico","year":"2007","unstructured":"D\u2019Amico AD, Goodall JR, Tesone DR, Kopylec JK (2007) Visual discovery in computer network defense. IEEE Comput Graph Appl 27(5):20\u201327","journal-title":"IEEE Comput Graph Appl"},{"key":"282_CR8","unstructured":"Ellson J, Gansner ER, Koutsofios E, North SC, Woodhull G (2003) Graphviz and dynagraph static and dynamic graph drawing tools. In: GRAPH DRAWING SOFTWARE, Springer, Berlin, pp 127\u2013148"},{"key":"282_CR9","doi-asserted-by":"crossref","unstructured":"Ertek G, Demiriz A (2006) A framework for visualizing association mining results. In: Proceedings of the 21st International Conference on computer and information sciences","DOI":"10.1007\/11902140_63"},{"issue":"4","key":"282_CR10","first-page":"137","volume":"33","author":"C Estan","year":"2003","unstructured":"Estan C, Savage S, Varghese G (2003) Automatically inferring patterns of resource consumption in network traffic. Comp Commun Rev 33(4):137\u2013150","journal-title":"Comp Commun Rev"},{"key":"282_CR11","unstructured":"Fischer F, Mansmann F, Keim DA, Pietzko S, Waldvogel M (2008) Large-scale network monitoring for visual analysis of attacks. In: Proceedings of the 5th International Workshop on visualization for computer, security"},{"key":"282_CR12","doi-asserted-by":"crossref","unstructured":"Fruchterman TMJ, Reingold EM (1991) Graph drawing by force-directed placement. Softw Pract Exp 21(11):1129\u20131164","DOI":"10.1002\/spe.4380211102"},{"key":"282_CR13","doi-asserted-by":"crossref","unstructured":"Glanfield J, Brooks S, Taylor T, Paterson D, Smith C, Gates C, Mchugh J (2009) OverFlow: An overview visualization for network analysis. In: Proceedings of workshop on visualization for cyber security (VizSec)","DOI":"10.1109\/VIZSEC.2009.5375536"},{"key":"282_CR14","doi-asserted-by":"crossref","unstructured":"Glatz E (2010) Visualizing host traffic through graphs. In: Proceedings of the Seventh International Symposium on visualization for cyber, security","DOI":"10.1145\/1850795.1850802"},{"key":"282_CR15","doi-asserted-by":"crossref","unstructured":"Glatz E, Dimitropoulos X (2012) Classifying internet one-way traffic. In: Proceedings of ACM SIGCOMM Internet Measurement Conference","DOI":"10.1145\/2398776.2398781"},{"key":"282_CR16","unstructured":"Haag P (2005) Watch your flows with nfsen and nfdump. In: In 50th RIPE Meeting"},{"key":"282_CR17","unstructured":"Hahsler M, Chelluboina S (2011) Visualizing association rules: Introduction to the R-extension package arulesViz. R project module"},{"key":"282_CR18","doi-asserted-by":"crossref","unstructured":"Iliofotou M, Pappu P, Faloutsos M, Mitzenmacher M, Singh S, Varghese G (2007) Network monitoring using traffic dispersion graphs (TDGs). In: Proceedings of ACM SIGCOMM Internet Measurement Conference","DOI":"10.1145\/1298306.1298349"},{"key":"282_CR19","doi-asserted-by":"crossref","unstructured":"Jin Y, Sharafuddin E, Zhang Z.-L (2009) Unveiling core network-wide communication patterns through application traffic activity graph decomposition. In: Proceedings of SIGMETRICS","DOI":"10.1145\/1555349.1555356"},{"issue":"1","key":"282_CR20","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/0020-0190(89)90102-6","volume":"31","author":"T Kamada","year":"1989","unstructured":"Kamada T, Kawai S (1989) An algorithm for drawing general undirected graphs. Inf Process Lett 31(1):7\u201315","journal-title":"Inf Process Lett"},{"key":"282_CR21","doi-asserted-by":"crossref","unstructured":"Karagiannis T, Papagiannaki K, Faloutsos M (2005) Blinc: multilevel traffic classification in the dark. In: Proceedings of the 2005 Conference on applications, technologies, architectures, and protocols for computer communications","DOI":"10.1145\/1080091.1080119"},{"key":"282_CR22","doi-asserted-by":"crossref","unstructured":"Lakkaraju K, Yurcik W, Lee AJ (2004) Nvisionip: netflow visualizations of system state for security situational awareness. In: Proceedings of the 2004 ACM workshop on visualization and data mining for computer, security","DOI":"10.1145\/1029208.1029219"},{"key":"282_CR23","unstructured":"Luca Deri. ntop. http:\/\/www.ntop.org"},{"key":"282_CR24","unstructured":"Plonka D (2000) Flowscan: a network traffic flow reporting and visualization tool. In: Proceedings of the 14th USENIX Conference on system administration"},{"key":"282_CR25","unstructured":"Leinen S (2001) Fluxoscope \u2014a system for flow-based accounting. In: Proceedings of the 2001 passive and active measurement workshop (poster). http:\/\/www.switch.ch\/network\/operation\/statistics\/fluxoscope\/"},{"key":"282_CR26","doi-asserted-by":"crossref","unstructured":"Srikant R, Agrawal R (1997) Mining generalized association rules. Future Gener Comput Syst 13(2\u20133): 161\u2013180","DOI":"10.1016\/S0167-739X(97)00019-8"},{"key":"282_CR27","doi-asserted-by":"crossref","unstructured":"Taylor T, Paterson D, Glanfield J, Gates C, Brooks S, McHugh J (2009) Flovis: flow visualization system. In: Conference for homeland security, 2009. CATCH \u201909. Cybersecurity applications technology","DOI":"10.1109\/CATCH.2009.18"},{"issue":"5","key":"282_CR28","doi-asserted-by":"crossref","first-page":"652","DOI":"10.1109\/TKDE.2005.81","volume":"17","author":"J Wang","year":"2005","unstructured":"Wang J, Han J, Lu Y, Tzvetkov P (2005) Tfp: an efficient algorithm for mining top-k frequent closed itemsets. Knowl Data Eng IEEE Trans 17(5):652\u2013663","journal-title":"Knowl Data Eng IEEE Trans"},{"key":"282_CR29","doi-asserted-by":"crossref","unstructured":"Yin X, Yurcik W, Treaster M, Li Y, Lakkaraju K (2004) Visflowconnect: netflow visualizations of link relationships for security situational awareness. In: Proceedings of the 2004 ACM workshop on visualization and data mining for computer, security","DOI":"10.1145\/1029208.1029214"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-013-0282-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00607-013-0282-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-013-0282-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,8]],"date-time":"2019-07-08T17:04:54Z","timestamp":1562605494000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00607-013-0282-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1,23]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,1]]}},"alternative-id":["282"],"URL":"https:\/\/doi.org\/10.1007\/s00607-013-0282-8","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,1,23]]}}}