A survey of visualization for smart manufacturing

F Zhou, X Lin, C Liu, Y Zhao, P Xu, L Ren, T Xue… - Journal of …, 2019 - Springer
In smart manufacturing, people are facing an increasing amount of industrial data derived
from various digitalized and connected sources in all kinds of formats. Analyzing and …

A survey of network anomaly visualization

T Zhang, X Wang, Z Li, F Guo, Y Ma… - Science China Information …, 2017 - Springer
Network anomaly analysis is an emerging subtopic of network security. Network anomaly
refers to the unusual behavior of network devices or suspicious network status. A number of …

Visually enhanced situation awareness for complex manufacturing facility monitoring in smart factories

F Zhou, X Lin, X Luo, Y Zhao, Y Chen, N Chen… - Journal of Visual …, 2018 - Elsevier
With the widespread application of networked information-based technologies throughout
industry manufacturing, modern manufacturing facilities give rise to unprecedented levels of …

Visual analytics of anomalous user behaviors: A survey

Y Shi, Y Liu, H Tong, J He, G Yan… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
With the pervasive use of information technologies, the increasing availability of data
provides new opportunities for understanding user behaviors. Unearthing anomalies in user …

An evaluation framework for network security visualizations

I Sharafaldin, AH Lashkari, AA Ghorbani - Computers & Security, 2019 - Elsevier
Visualization helps to comprehend and analyze large amounts of data, a fundamental
necessity for network security due to the large volume of audits traces produced each day. In …

An interactive visual analytics approach for network anomaly detection through smart labeling

X Fan, C Li, X Yuan, X Dong, J Liang - Journal of Visualization, 2019 - Springer
Network anomaly detection is an important means for safeguarding network security. On
account of the difficulties encountered in traditional automatic detection methods such as …

External Extrinsic Calibration of Multi-modal Imaging Sensors: A Review

Z Liu, Z Chen, X Wei, W Chen, Y Wang - IEEE Access, 2023 - ieeexplore.ieee.org
With the rapid development of autonomous driving, robotics, and intelligent transportation,
multi-sensor-based environment sensing technology for intelligent vehicles has become a …

[PDF][PDF] 多视图合作的网络流量时序数据可视分析

赵颖, 王权, 黄叶子, 吴青, 张胜 - 软件学报, 2016 - jos.org.cn
网络安全可视化作为一个交叉应用研究领域, 为传统网络安全数据分析方法注入了新的活力.
但已有研究过于注重网络安全数据的可视表达, 而忽视了对分析流程的支持 …

CHRAVAT-chronology awareness visual analytic tool

S Cirillo, D Desiato, B Breve - 2019 23rd International …, 2019 - ieeexplore.ieee.org
Nowadays, the amount of information spread over networks is extremely large, and many
sensible data are granted by legitimate owners aiming to exploit different networking …

Machine learning combining with visualization for intrusion detection: a survey

Y Yu, J Long, F Liu, Z Cai - … Conference, MDAI 2016, Sant Julià de Lòria …, 2016 - Springer
Intrusion detection is facing great challenges as network attacks producing massive volumes
of data are increasingly sophisticated and heterogeneous. In order to gain much more …