{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T09:04:15Z","timestamp":1751706255967,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":19,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781441903112"},{"type":"electronic","value":"9781441903129"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-1-4419-0312-9_12","type":"book-chapter","created":{"date-parts":[[2009,10,19]],"date-time":"2009-10-19T16:06:33Z","timestamp":1255968393000},"page":"185-194","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Novel Visualization Method for Detecting DDoS Network Attacks"],"prefix":"10.1007","author":[{"given":"Jiawan","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Guoqiang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Liangfu","family":"Lu","sequence":"additional","affiliation":[]},{"given":"MaoLin","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Che","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,9,30]]},"reference":[{"key":"12_CR1","volume-title":"\u201cVisFlowConnect: NetFlow Visualizations of Link Relationships for Security Situational Awareness.\u201d Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security","author":"X. Yin","year":"2004","unstructured":"X. Yin, W. Yurcik,: et al. \u201cVisFlowConnect: NetFlow Visualizations of Link Relationships for Security Situational Awareness.\u201d Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security. Washington, DC, USA, ACM Press."},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Robert F. Erbacher.: \u201cVisual traffic monitoring and evaluation\u201d. In Proceedings of the Conference on Internet Performance and Control of Network Systems II, 2001, pp 153\u2013160.","DOI":"10.1117\/12.434309"},{"key":"12_CR3","unstructured":"L. Girardin and D. Brodbeck.: \u201cA visual approach for monitoring logs\u201d. In Proceedings of the 12th Usenix System Administration conference, 1998, pp 299\u2013308."},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Chris Muelder, Kwan-Liu Ma and Tony Bartoletti,: A Visualization Methodology for Characterization of Network Scans, Visualization for Computer Security, 2005, pp.29-38","DOI":"10.1109\/VIZSEC.2005.1532063"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"J. Pearlman, P.R.: Visualizing Network Security Events Using Compound Glyphs from a Service-Oriented Perspective. In Visualization for Computer Security. VizSEC 2007:Proceedings of the Workshop on Visualization for Computer Security, 2007, pp. 131\u223c146.","DOI":"10.1007\/978-3-540-78243-8_9"},{"key":"12_CR6","unstructured":"Chris P. Lee, J.T., Nicholas Gibbs,Raheem Beyah,John A. Copeland.: Visual Firewall: Realtime Network Security Monitor. in IEEE Workshop on Visualization for Computer Security 2005 (VizSEC 05), 2005:129\u223c136."},{"key":"12_CR7","first-page":"90","volume-title":"3D Audio-Visual Immersion for Network Security and Management. in the 2004 ACM Workshop on Visualization and Data Mining for Computer Security","author":"C.K. Christos Papadopoulos","year":"2004","unstructured":"Christos Papadopoulos, C.K., Alexander Sawchuk, Xinming He. CyberSeer: 3D Audio-Visual Immersion for Network Security and Management. in the 2004 ACM Workshop on Visualization and Data Mining for Computer Security. 2004. Washington, DC, USA: ACM Press,pp:90\u223c98."},{"key":"12_CR8","first-page":"99","volume-title":"A Framework for Classifying Denial of Service Attacks. in Sigcomm 2003","author":"A. Hussain","year":"2003","unstructured":"A. Hussain, J.H.a.C.P.: A Framework for Classifying Denial of Service Attacks. in Sigcomm 2003. Karlsruhe, Germany. 2003:99\u223c110."},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Muelder, C., Ma, K.L., Bartoletti, T.: A visualization methodology for characterization of network scans. Visualization for Computer Security, IEEE Workshops, 2005, pp. 4 - 4.","DOI":"10.1109\/VIZSEC.2005.2"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Conti, G., Abdullah, K.: \u201cPassive visual fingerprinting of network attack tools\u201d. VizSEC\/DMSEC \u201904: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, 2004,pp. 45 - 54","DOI":"10.1145\/1029208.1029216"},{"key":"12_CR11","unstructured":"Jonathan McPherson, Kwan-Liu Ma, Paul Krystosk, Tony Bartoletti, Marvin Christensen.:Portvis: \u201cA tool for port-based detection of security events\u201d. In: ACM VizSEC 2004 Workshop, 2004, pp. 73 - 81"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Pin Ren, Yan Gao and Zhichun Li,: \u201cIDGraphs: Intrusion Detection and Analysis Using Histographs\u201d, Visualization for Computer Security, 2005, pp.39-46","DOI":"10.1109\/MCG.2006.36"},{"key":"12_CR13","unstructured":"Stuart K. Card, Jock D. Mackinlay and Ben Shneiderman,: \u201cReadings in information visualization: using vision to think\u201d, Morgan Kaufmann Publishers, 1999"},{"key":"12_CR14","volume-title":"\u201cA Survey, Taxonomy, and Analysis of Network Security Visualization Techniques\u201d [Master Paper]","author":"Rawiroj Robert Kasemsri","year":"2005","unstructured":"Rawiroj Robert Kasemsri,: \u201cA Survey, Taxonomy, and Analysis of Network Security Visualization Techniques\u201d [Master Paper], USA, Georgia State University, 2005"},{"issue":"1","key":"12_CR15","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/2945.468391","volume":"1","author":"A. Richard Becker","year":"1995","unstructured":"Richard A. Becker, Stephen G. Eick, and Allan R.Wilks. :\u201cVisualizing network data\u201d. IEEE Transactions on Visualization and ComputerGraphics,1995 1(1):pp.16\u201328.","journal-title":"IEEE Transactions on Visualization and ComputerGraphics"},{"key":"12_CR16","unstructured":"Prefuse, http:\/\/www.prefuse.org\/"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Mukosaka, S.;,Koike, H.:\u201cIntegrated visualization system for monitoring security in largescale local area network Visualization\u201d,APVIS \u2019.2007 6th International Asia-Pacific Symposium, 2007,pp.41\u2013 44","DOI":"10.1109\/APVIS.2007.329273"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Musa, Shahrulniza, Parish,etc.: \u201cVisualizing Communication Network Security Attacks\u201d,Information Visualization,IV \u201907. 11th Internati onal Conference, 2007, pp. 726-733","DOI":"10.1109\/IV.2007.149"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Pavel Minarik1 , Tomas Dymacek.: \u201cNetFlow Data Visualization Based on Graphs\u201d, In Visualization for Computer Security ,VizSEC 2008: Proceedings of the Workshop on Visualization for Computer Security, 2008, pp. 144-151","DOI":"10.1007\/978-3-540-85933-8_14"}],"container-title":["Visual Information Communication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4419-0312-9_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T20:50:07Z","timestamp":1739393407000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4419-0312-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9781441903112","9781441903129"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-1-4419-0312-9_12","relation":{},"subject":[],"published":{"date-parts":[[2009]]},"assertion":[{"value":"30 September 2009","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}