Real-time big data processing for anomaly detection: A survey

RAA Habeeb, F Nasaruddin, A Gani… - International Journal of …, 2019 - Elsevier
The advent of connected devices and omnipresence of Internet have paved way for
intruders to attack networks, which leads to cyber-attack, financial loss, information theft in …

A survey on information visualization: recent advances and challenges

S Liu, W Cui, Y Wu, M Liu - The Visual Computer, 2014 - Springer
Abstract Information visualization (InfoVis), the study of transforming data, information, and
knowledge into interactive visual representations, is very important to users because it …

Security operations center: A systematic study and open challenges

M Vielberth, F Böhm, I Fichtinger, G Pernul - Ieee Access, 2020 - ieeexplore.ieee.org
Since the introduction of Security Operations Centers (SOCs) around 15 years ago, their
importance has grown significantly, especially over the last five years. This is mainly due to …

A hybrid deep learning image-based analysis for effective malware detection

S Venkatraman, M Alazab, R Vinayakumar - Journal of Information Security …, 2019 - Elsevier
The explosive growth of Internet and the recent increasing trends in automation using
intelligent applications have provided a veritable playground for malicious software …

The state of the art in visualizing multivariate networks

C Nobre, M Meyer, M Streit, A Lex - Computer Graphics Forum, 2019 - Wiley Online Library
Multivariate networks are made up of nodes and their relationships (links), but also data
about those nodes and links as attributes. Most real‐world networks are associated with …

Datasets are not enough: Challenges in labeling network traffic

JL Guerra, C Catania, E Veas - Computers & Security, 2022 - Elsevier
In contrast to previous surveys, the present work is not focused on reviewing the datasets
used in the network security field. The fact is that many of the available public labeled …

Use of data visualisation for zero‐day malware detection

S Venkatraman, M Alazab - Security and Communication …, 2018 - Wiley Online Library
With the explosion of Internet of Things (IoT) worldwide, there is an increasing threat from
malicious software (malware) attackers that calls for efficient monitoring of vulnerable …

A survey of visualization for smart manufacturing

F Zhou, X Lin, C Liu, Y Zhao, P Xu, L Ren, T Xue… - Journal of …, 2019 - Springer
In smart manufacturing, people are facing an increasing amount of industrial data derived
from various digitalized and connected sources in all kinds of formats. Analyzing and …

[PDF][PDF] 网络入侵检测技术综述

蹇诗婕, 卢志刚, 杜丹, 姜波, 刘宝旭 - 信息安全学报, 2020 - jcs.iie.ac.cn
摘要随着互联网时代的发展, 内部威胁, 零日漏洞和DoS 攻击等攻击行为日益增加,
网络安全变得越来越重要, 入侵检测已成为网络攻击检测的一种重要手段. 随着机器学习算法的 …

Systems and methods for creating and modifying access control lists

M Rieke, JS Dennis - US Patent 9,769,174, 2017 - Google Patents
(51)(57) ABSTRACT Embodiments of the present disclosure can present infor mation on
services hosted and used by various assets on a network, and allow users to control access …