A survey of visualization systems for network security

H Shiravi, A Shiravi, AA Ghorbani - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Security Visualization is a very young term. It expresses the idea that common visualization
techniques have been designed for use cases that are not supportive of security-related …

A survey on information visualization for network and service management

VT Guimaraes, CMDS Freitas, R Sadre… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Network and service management encompasses a set of activities, methods, procedures,
and tools, whose ultimate goal is to guarantee the proper functioning of a networked system …

Effective feature extraction via stacked sparse autoencoder to improve intrusion detection system

B Yan, G Han - IEEE Access, 2018 - ieeexplore.ieee.org
Classification features are crucial for an intrusion detection system (IDS), and the detection
performance of IDS will change dramatically when providing different input features …

[图书][B] Visualization of time-oriented data

W Aigner, S Miksch, H Schumann, C Tominski - 2011 - Springer
Time is an exceptional dimension with high relevance in medicine, engineering, business,
science, biography, history, planning, or project management. Understanding time-oriented …

Use of data visualisation for zero‐day malware detection

S Venkatraman, M Alazab - Security and Communication …, 2018 - Wiley Online Library
With the explosion of Internet of Things (IoT) worldwide, there is an increasing threat from
malicious software (malware) attackers that calls for efficient monitoring of vulnerable …

Determining threat level associated with network activity

I Connary, DJ Buck, MF Caldwell… - US Patent 7,418,733, 2008 - Google Patents
Network devices such as intrusion detection systems, routers, firewalls, servers, and other
network devices are monitored to aggregate all event data generated by monitored devices …

Targetvue: Visual analysis of anomalous user behaviors in online communication systems

N Cao, C Shi, S Lin, J Lu, YR Lin… - IEEE transactions on …, 2015 - ieeexplore.ieee.org
Users with anomalous behaviors in online communication systems (eg email and social
medial platforms) are potential threats to society. Automated anomaly detection based on …

NVisionIP: netflow visualizations of system state for security situational awareness

K Lakkaraju, W Yurcik, AJ Lee - Proceedings of the 2004 ACM workshop …, 2004 - dl.acm.org
The number of attacks against large computer systems is currently growing at a rapid pace.
Despite the best efforts of security analysts, large organizations are having trouble keeping …

[PDF][PDF] A Survey Visualization Systems For Network Security

HK Mistry, C Mavani, A Goswami… - … : Theory and Practice, 2024 - researchgate.net
This paper explores the development and application of visualization tools and techniques
for network security and highlights their role in addressing cyber security challenges. It …

A comparison of radial and linear charts for visualizing daily patterns

M Waldner, A Diehl, D Gračanin… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
Radial charts are generally considered less effective than linear charts. Perhaps the only
exception is in visualizing periodical time-dependent data, which is believed to be naturally …