{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T21:46:29Z","timestamp":1710366389765},"reference-count":22,"publisher":"Elsevier BV","issue":"5","license":[{"start":{"date-parts":[[2009,7,1]],"date-time":"2009-07-01T00:00:00Z","timestamp":1246406400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers & Security"],"published-print":{"date-parts":[[2009,7]]},"DOI":"10.1016\/j.cose.2008.12.003","type":"journal-article","created":{"date-parts":[[2008,12,25]],"date-time":"2008-12-25T10:13:25Z","timestamp":1230200005000},"page":"276-288","source":"Crossref","is-referenced-by-count":58,"title":["Fast detection and visualization of network attacks on parallel coordinates"],"prefix":"10.1016","volume":"28","author":[{"given":"Hyunsang","family":"Choi","sequence":"first","affiliation":[]},{"given":"Heejo","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Hyogon","family":"Kim","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.cose.2008.12.003_bib5","unstructured":"Akritidis P, Anagnostakis K, Markatos E. Efficient content-based detection of zero-day worms. In: Proc. of IEEE ICC; May 2005."},{"key":"10.1016\/j.cose.2008.12.003_bib19","doi-asserted-by":"crossref","unstructured":"Axelsson S. Visualization for intrusion detection: Hooking the worm. In: Proc. of ESORICS; October 2003.","DOI":"10.1007\/978-3-540-39650-5_18"},{"key":"10.1016\/j.cose.2008.12.003_bib6","series-title":"Cisco IOS NetFlow","year":"2006"},{"key":"10.1016\/j.cose.2008.12.003_bib3","doi-asserted-by":"crossref","unstructured":"Conti G, Abdullah K. Passive visual fingerprinting of network attack tools. In: Proc. of ACM VizSEC\/DMSEC; October 2004.","DOI":"10.1145\/1029208.1029216"},{"key":"10.1016\/j.cose.2008.12.003_bib17","unstructured":"Fischer F, Mansmann F, Keim DA, Pietzko S, Waldvogel M. Large-scale network monitoring for visual analysis of attacks. In: Proc. of ACM VizSEC\/DMSEC; 2008."},{"key":"10.1016\/j.cose.2008.12.003_bib11","doi-asserted-by":"crossref","unstructured":"Gil T, Poletto M. MULTOPS: a data-structure for bandwidth attack detection. In: Proc. of USENIX security symposium; August 2001.","DOI":"10.21236\/ADA401819"},{"key":"10.1016\/j.cose.2008.12.003_bib4","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/BF01898350","article-title":"The plane with parallel coordinates","author":"Inselberg","year":"1985","journal-title":"The Visual Computer"},{"key":"10.1016\/j.cose.2008.12.003_bib21","doi-asserted-by":"crossref","unstructured":"Karagiannis T, Papagiannaki K, Faloutsos M. Blinc: Multilevel traffic classification in the dark. In: Proc. of ACM SIGCOMM; 2005.","DOI":"10.1145\/1080091.1080119"},{"key":"10.1016\/j.cose.2008.12.003_bib1","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1145\/381641.381656","article-title":"Visual exploration of large data sets","author":"Keim","year":"2001","journal-title":"Communications of the ACM"},{"key":"10.1016\/j.cose.2008.12.003_bib14","unstructured":"Kim S, Reddy A. A study of analyzing network traffic as images in real-time. In: Proc. of IEEE INFOCOM; 2005."},{"key":"10.1016\/j.cose.2008.12.003_bib2","article-title":"Real-time visualization of network attacks on high-speed links","author":"Kim","year":"2004","journal-title":"IEEE Network"},{"key":"10.1016\/j.cose.2008.12.003_bib22","unstructured":"Krasser V, Conti G. Real-time and forensic network data analysis using animated and coordinated visualization. In: Proc. of IEEE Workshop on Info. Assurance and Security; 2005."},{"key":"10.1016\/j.cose.2008.12.003_bib12","doi-asserted-by":"crossref","unstructured":"Lakkaraju K, Yurcik W, Adam J. NVisionIP: netflow visualizations of system state for security situational awareness. In: Proc. of ACM VizSEC\/DMSEC; 2004. p. 65\u201372.","DOI":"10.1145\/1029208.1029219"},{"key":"10.1016\/j.cose.2008.12.003_bib9","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/MSECP.2003.1219056","article-title":"Inside the slammer worm","author":"Moore","year":"2003","journal-title":"IEEE Security and Privacy"},{"key":"10.1016\/j.cose.2008.12.003_bib10","author":"ntop.org"},{"key":"10.1016\/j.cose.2008.12.003_bib13","unstructured":"Nyarko K, Capers T, Scott C, Ladeji-Osias K. Network intrusion visualization with NIVA, an intrusion detection visual analyzer with haptic integration. In: The 10th symp. on haptic interfaces for virtual environment and teleoperator systems; 2002."},{"key":"10.1016\/j.cose.2008.12.003_bib16","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1016\/j.cose.2006.10.001","article-title":"SVision: A novel visual network-anomaly identification technique","author":"Onut","year":"2007","journal-title":"Computers and Security"},{"key":"10.1016\/j.cose.2008.12.003_bib7","volume":"vol. 3917","author":"Quittek","year":"2004"},{"key":"10.1016\/j.cose.2008.12.003_bib15","doi-asserted-by":"crossref","unstructured":"Samak T, Ghanem S, Ismail MA. On the efficiency of using space-filling curves in network traffic representation. In: Proc. of IEEE INFOCOM; 2008.","DOI":"10.1109\/INFOCOM.2008.4544633"},{"key":"10.1016\/j.cose.2008.12.003_bib18","first-page":"16","article-title":"Statistical visualization methods in intrusion detection","author":"Solka","year":"2000","journal-title":"Computing Science and Statistics"},{"key":"10.1016\/j.cose.2008.12.003_bib8","author":"The University of Utah"},{"key":"10.1016\/j.cose.2008.12.003_bib20","doi-asserted-by":"crossref","unstructured":"Yin X, Yurcik W, Treaster M, Li Y, Lakkaraju K. VisFlowConnect: NetFlow visualizations of link relationships for security situational awarenes. In: Proc. of ACM VizSEC\/DMSEC; 2004.","DOI":"10.1145\/1029208.1029214"}],"container-title":["Computers & Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404808001363?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404808001363?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T17:46:49Z","timestamp":1558028809000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404808001363"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,7]]},"references-count":22,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2009,7]]}},"alternative-id":["S0167404808001363"],"URL":"https:\/\/doi.org\/10.1016\/j.cose.2008.12.003","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2009,7]]}}}