A survey on information visualization for network and service management

VT Guimaraes, CMDS Freitas, R Sadre… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Network and service management encompasses a set of activities, methods, procedures,
and tools, whose ultimate goal is to guarantee the proper functioning of a networked system …

Portola: a hybrid tree and network visualization technique for network segmentation

K Gupta, A Pandey, L Chan, A Yadav… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Network security is critical for organizations to secure their network resources from intrusion
and attacks. A security policy is a rule enforced in the network to allow or block network …

Machine learning techniques for cyber attacks detection

R Kozik, M Choraś - Image Processing and Communications Challenges 5, 2014 - Springer
The increased usage of cloud services, growing number of users, changes in network
infrastructure that connect devices running mobile operating systems, and constantly …

Malware visualization techniques

A Efe, SHS Hussin - … Journal of Applied Mathematics Electronics and …, 2020 - dergipark.org.tr
Malware basically means malicious software that can be an intrusive program code or
anything that is designed to perform malicious operations on system and executes malicious …

Design of interactive visualizations for next-generation ultra-large communication networks

W Chen, A Haque, K Sedig - IEEE Access, 2021 - ieeexplore.ieee.org
With the increasing size and complexity of next-generation communication networks, it is
critical to utilize interactive visualizations to support the monitoring, planning, and …

Cyber security of the application layer of mission critical industrial systems

R Kozik, M Choraś, R Renk, W Hołubowicz - … Information Systems and …, 2016 - Springer
In this paper we focus on proposing the effective methods of cyber protection of the
application layer. We also discuss how this challenge is related to mission critical industrial …

Semi-unsupervised machine learning for anomaly detection in http traffic

R Kozik, M Choraś, R Renk, W Hołubowicz - Proceedings of the 9th …, 2016 - Springer
Currently, the growing popularity of publicly available web services is one of the driving
forces for so-called “web hacking” activities. The main contribution of this paper is the semi …

[PDF][PDF] Digital forensics trends and future

F Dezfouli, A Dehghantanha - … Journal of Cyber …, 2014 - salford-repository.worktribe.com
Nowadays, rapid evolution of computers and mobile phones has caused these devices to be
used in criminal activities. Providing appropriate and sufficient security measures is a difficult …

An Interactive Visualization System for Network Security Data

L Zheng, G Yu, Y Zheng - Journal of Signal Processing Systems, 2023 - Springer
Data visualization is an important approach for data analysis, which can reveal the patterns
and characteristics of complex datasets through visual processing, and provide aid for data …

YENİ BİR AĞ GÜVENLİĞİ YAKLAŞIMI: DİNAMİK ZEKİ GÜVENLİK DUVARI MİMARİSİ

OA Erdem, R Kocaoğlu - Gazi Üniversitesi Mühendislik Mimarlık …, 2014 - dergipark.org.tr
Bu makalede, geleneksel güvenlik duvarı mimarilerinden tamamen farklı, yeni bir güvenlik
duvarı mimarisi geliştirilmiştir. Geliştirilen mimari DIFA (Dynamic Intelligent Firewall …