Deep time-series clustering: A review

A Alqahtani, M Ali, X Xie, MW Jones - Electronics, 2021 - mdpi.com
We present a comprehensive, detailed review of time-series data analysis, with emphasis on
deep time-series clustering (DTSC), and a case study in the context of movement behavior …

A survey of network anomaly visualization

T Zhang, X Wang, Z Li, F Guo, Y Ma… - Science China Information …, 2017 - Springer
Network anomaly analysis is an emerging subtopic of network security. Network anomaly
refers to the unusual behavior of network devices or suspicious network status. A number of …

Data visualization in internet of things: tools, methodologies, and challenges

A Protopsaltis, P Sarigiannidis, D Margounakis… - Proceedings of the 15th …, 2020 - dl.acm.org
As the Internet of Things (IoT) grows rapidly, huge amounts of wireless sensor networks
emerged monitoring a wide range of infrastructure, in various domains such as healthcare …

Clustering and classification for time series data in visual analytics: A survey

M Ali, A Alqahtani, MW Jones, X Xie - IEEE Access, 2019 - ieeexplore.ieee.org
Visual analytics for time series data has received a considerable amount of attention.
Different approaches have been developed to understand the characteristics of the data and …

Evaluating multi-dimensional visualizations for understanding fuzzy clusters

Y Zhao, F Luo, M Chen, Y Wang, J Xia… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
Fuzzy clustering assigns a probability of membership for a datum to a cluster, which veritably
reflects real-world clustering scenarios but significantly increases the complexity of …

A fake review identification framework considering the suspicion degree of reviews with time burst characteristics

N Wang, J Yang, X Kong, Y Gao - Expert Systems with Applications, 2022 - Elsevier
With the rapid development of e-commerce, online reviews have played an increasingly
important role in consumers' shopping intentions and behaviors. Therefore, how to …

Visually enhanced situation awareness for complex manufacturing facility monitoring in smart factories

F Zhou, X Lin, X Luo, Y Zhao, Y Chen, N Chen… - Journal of Visual …, 2018 - Elsevier
With the widespread application of networked information-based technologies throughout
industry manufacturing, modern manufacturing facilities give rise to unprecedented levels of …

Netcapvis: Web-based progressive visual analytics for network packet captures

A Ulmer, D Sessler… - 2019 IEEE Symposium on …, 2019 - ieeexplore.ieee.org
Network traffic log data is a key data source for forensic analysis of cybersecurity incidents.
Packet Captures (PCAPs) are the raw information directly gathered from the network device …

Network anomaly traffic detection algorithm based on SVM

Y Lei - 2017 International Conference on Robots & Intelligent …, 2017 - ieeexplore.ieee.org
In order to guarantee the high level of network security and improve the user experience of
the network, in this paper, we propose an effective network anomaly traffic detection …

An evaluation framework for network security visualizations

I Sharafaldin, AH Lashkari, AA Ghorbani - Computers & Security, 2019 - Elsevier
Visualization helps to comprehend and analyze large amounts of data, a fundamental
necessity for network security due to the large volume of audits traces produced each day. In …