A taxonomy and survey of dynamic graph visualization

F Beck, M Burch, S Diehl… - Computer graphics …, 2017 - Wiley Online Library
Dynamic graph visualization focuses on the challenge of representing the evolution of
relationships between entities in readable, scalable and effective diagrams. This work …

[PDF][PDF] The State of the Art in Visualizing Dynamic Graphs.

F Beck, M Burch, S Diehl, D Weiskopf - EuroVis (STARs), 2014 - visus.uni-stuttgart.de
Dynamic graph visualization focuses on the challenge of representing the evolution of
relationships between entities in readable, scalable, and effective diagrams. This work …

Big Data computing and clouds: Trends and future directions

MD Assunção, RN Calheiros, S Bianchi… - Journal of parallel and …, 2015 - Elsevier
This paper discusses approaches and environments for carrying out analytics on Clouds for
Big Data applications. It revolves around four important areas of analytics and Big Data …

网络安全数据可视化综述

赵颖, 樊晓平, 周芳芳, 汪飞, 张加万 - 计算机辅助设计与图形学学报, 2014 - jcad.cn
网络安全可视化是一个新兴的交叉研究领域, 它通过提供交互式可视化工具,
提升网络安全分析人员感知, 分析和理解网络安全问题的能力. 通过近些年来的研究 …

A survey of network anomaly visualization

T Zhang, X Wang, Z Li, F Guo, Y Ma… - Science China Information …, 2017 - Springer
Network anomaly analysis is an emerging subtopic of network security. Network anomaly
refers to the unusual behavior of network devices or suspicious network status. A number of …

Efficient intrusion detection using representative instances

C Guo, YJ Zhou, Y Ping, SS Luo, YP Lai, ZK Zhang - Computers & security, 2013 - Elsevier
Because of their feasibility and effectiveness, artificial intelligence-based intrusion detection
systems attract considerable interest from researchers. However, when confronted with large …

Visual analysis of collective anomalies through high-order correlation graph

J Tao, L Shi, Z Zhuang, C Huang, R Yu… - 2018 IEEE Pacific …, 2018 - ieeexplore.ieee.org
Detecting, analyzing and reasoning collective anomalies is important for many real-life
application domains such as facility monitoring, software analysis and security. The main …

网络拓扑结构可视化方法研究与发展

王松, 张野, 吴亚东 - 网络与信息安全学报, 2018 - infocomm-journal.com
网络拓扑结构可视化作为网络检测管理和网络安全态势感知的基础, 在呈现网络的整体状况和
发现存在于网络拓扑中的潜在规律方面发挥着重要作用. 介绍了网络拓扑结构可视化的基本内容 …

Visual analysis of collective anomalies using faceted high-order correlation graphs

J Yan, L Shi, J Tao, X Yu, Z Zhuang… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
Successfully detecting, analyzing, and reasoning about collective anomalies is important for
many real-life application domains (eg, intrusion detection, fraud analysis, software security) …

[PDF][PDF] Interactive visualization of event logs for cybersecurity

BCM Cappers - 2018 - research.tue.nl
I remember the day well when I entered Jack'so ce four years ago. As a Master student in
Software Engineering I was looking for a supervisor in visualization to support me in the …