Survey on visual analysis of event sequence data

Y Guo, S Guo, Z Jin, S Kaul, D Gotz… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Event sequence data record series of discrete events in the time order of occurrence. They
are commonly observed in a variety of applications ranging from electronic health records to …

BGP anomaly detection techniques: A survey

B Al-Musawi, P Branch… - … Communications Surveys & …, 2016 - ieeexplore.ieee.org
The border gateway protocol (BGP) is the Internet's default inter-domain routing protocol that
manages connectivity among autonomous systems (ASes). Over the past two decades many …

The state of affairs in BGP security: A survey of attacks and defenses

A Mitseva, A Panchenko, T Engel - Computer Communications, 2018 - Elsevier
Abstract The Border Gateway Protocol (BGP) is the de facto standard interdomain routing
protocol. Despite its critical role on the Internet, it does not provide any security guarantees …

AgentLens: Visual Analysis for Agent Behaviors in LLM-based Autonomous Systems

J Lu, B Pan, J Chen, Y Feng, J Hu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Recently, Large Language Model based Autonomous System (LLMAS) has gained great
popularity for its potential to simulate complicated behaviors of human societies. One of its …

A survey on information visualization for network and service management

VT Guimaraes, CMDS Freitas, R Sadre… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Network and service management encompasses a set of activities, methods, procedures,
and tools, whose ultimate goal is to guarantee the proper functioning of a networked system …

网络安全数据可视化综述

赵颖, 樊晓平, 周芳芳, 汪飞, 张加万 - 计算机辅助设计与图形学学报, 2014 - jcad.cn
网络安全可视化是一个新兴的交叉研究领域, 它通过提供交互式可视化工具,
提升网络安全分析人员感知, 分析和理解网络安全问题的能力. 通过近些年来的研究 …

Visual analytics of anomalous user behaviors: A survey

Y Shi, Y Liu, H Tong, J He, G Yan… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
With the pervasive use of information technologies, the increasing availability of data
provides new opportunities for understanding user behaviors. Unearthing anomalies in user …

Evaluating visualization approaches to detect abnormal activities in network traffic data

SY Ji, BK Jeong, DH Jeong - International Journal of Information Security, 2021 - Springer
Designing innovative approaches to detect intrusive network activities is considered as one
of the most significant research topics in network security. Various computational methods …

The state of the art in BGP visualization tools: A mapping of visualization techniques to cyberattack types

J Raynor, T Crnovrsanin… - … on Visualization and …, 2022 - ieeexplore.ieee.org
Internet routing is largely dependent on Border Gateway Protocol (BGP). However, BGP
does not have any inherent authentication or integrity mechanisms that help make it secure …

Bigfoot: A geo-based visualization methodology for detecting bgp threats

M Syamkumar, R Durairajan… - 2016 IEEE Symposium …, 2016 - ieeexplore.ieee.org
Studies of inter-domain routing in the Internet have highlighted the complex and dynamic
nature of connectivity changes that take place daily on a global scale. The ability to assess …