Network and service management encompasses a set of activities, methods, procedures, and tools, whose ultimate goal is to guarantee the proper functioning of a networked system …
A Ottley, R Garnett, R Wan - Computer Graphics Forum, 2019 - Wiley Online Library
The goal of visual analytics is to create a symbiosis between human and computer by leveraging their unique strengths. While this model has demonstrated immense success, we …
The goal of cyber security visualization is to help analysts increase the safety and soundness of our digital infrastructures by providing effective tools and workspaces …
MN Mahdi, AR Ahmad, R Ismail, H Natiq… - IEEE …, 2020 - ieeexplore.ieee.org
In the modern society, Internet provides massive amounts of heterogeneous information, hence Information overload has become an ubiquitous issue. In this paper, we conduct a …
C Kintzel, J Fuchs, F Mansmann - … of the 8th international symposium on …, 2011 - dl.acm.org
The growing amounts of hosts that are placed into the networks represent an enormous challenge to most network administrators who have to monitor these hosts conscientiously …
D Inoue, M Eto, K Suzuki, M Suzuki… - Proceedings of the ninth …, 2012 - dl.acm.org
A darknet is a set of unused IP addresses whose monitoring is an effective way of detecting malicious activities on the Internet. We have developed an alert system called DAEDALUS …
Monitoring network traffic and detecting anomalies are essential tasks that are carried out routinely by security analysts. The sheer volume of network requests often makes it difficult …
JR Goodall - VizSEC 2007: Proceedings of the Workshop on …, 2008 - Springer
Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. Automated systems to combat this threat are one potential solution, but most automated …
Z Liu, J Stasko, T Sullivan - IEEE Transactions on Visualization …, 2009 - ieeexplore.ieee.org
We present a case study of our experience designing SellTrend, a visualization system for analyzing airline travel purchase requests. The relevant transaction data can be …