{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T13:56:12Z","timestamp":1742997372464,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319076195"},{"type":"electronic","value":"9783319076201"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07620-1_3","type":"book-chapter","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T12:55:03Z","timestamp":1402404903000},"page":"23-32","source":"Crossref","is-referenced-by-count":2,"title":["Visualization of System Log Files for Post-incident Analysis and Response"],"prefix":"10.1007","author":[{"given":"John","family":"Haggerty","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Hughes-Roberts","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Ando, R., Kadobayashi, Y., Shinoda, Y.: Blink: Large-scale P2P network monitoring and visualization system using VM introspection. In: Proceedings of the Sixth International Conference on Networked Computing and Advanced Information Management, Seoul, South Korea, August 16-18, pp. 351\u2013358 (2010)"},{"issue":"6","key":"3_CR2","doi-asserted-by":"publisher","first-page":"620","DOI":"10.1109\/THMS.2013.2285047","volume":"43","author":"C. Wang","year":"2013","unstructured":"Wang, C., Xiao, Z., Li, Y., Xu, Y., Zhou, A., Zhang, K.: SentiView: Sentiment Analysis and Visualization for Internet Popular Topics. IEEE Transactions on Human-Machine Systems\u00a043(6), 620\u2013630 (2013)","journal-title":"IEEE Transactions on Human-Machine Systems"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Dunlop, M., Urbanski, W., Marchany, R., Tront, J.: Leveraging Cognitive Principles to Improve Security Visualization. In: Proceedings of Networked Digital Technologies, Dubai, UAE, April 24-26, pp. 262\u2013276 (2012)","DOI":"10.1007\/978-3-642-30567-2_22"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Giacobe, N.A., Xu, S.: Geovisual analytics for cyber security: Adopting the GeoViz Toolkit. In: Proceedings of the IEEE Conference on Visual Analytics Science and Technology, Providence, RI, USA, October 23-28, pp. 315\u2013316 (2011)","DOI":"10.1109\/VAST.2011.6102491"},{"issue":"12","key":"3_CR5","doi-asserted-by":"publisher","first-page":"2566","DOI":"10.1109\/TVCG.2013.231","volume":"19","author":"J. Guerra-Gomez","year":"2013","unstructured":"Guerra-Gomez, J., Pack, M.L., Plaisant, C., Shneiderman, B.: Visualizing Change over Time Using Dynamic Hierarchies: TreeVersity2 and the StemView. IEEE Transactions on Visualization and Computer Graphics\u00a019(12), 2566\u20132575 (2013)","journal-title":"IEEE Transactions on Visualization and Computer Graphics"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Haggerty, J., Haggerty, S., Taylor, M.: Forensic Triage of Email Network Narratives through Visualisation. Journal of Information Management and Computer Security (forthcoming, 2014)","DOI":"10.1108\/IMCS-11-2013-0080"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Koniaris, I., Papadimitriou, G., Nicopolitidis, P.: Analysis and Visualization of SSH Attacks Using Honeypots. In: Proceedings of EuroCon, Zagreb, Croatia, July 1-4, pp. 65\u201372 (2013)","DOI":"10.1109\/EUROCON.2013.6624967"},{"issue":"6","key":"3_CR8","doi-asserted-by":"publisher","first-page":"966","DOI":"10.1109\/TVCG.2011.80","volume":"18","author":"H. Krishnan","year":"2012","unstructured":"Krishnan, H., Garth, C., Guhring, J., Gulsun, M.A., Greiser, A., Joy, K.I.: Analysis of Time-Dependent Flow-Sensitive PC-MRI Data. IEEE Transactions on Visualization and Computer Graphics\u00a018(6), 966\u2013977 (2012)","journal-title":"IEEE Transactions on Visualization and Computer Graphics"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Mantoro, T., Aziz, N.A., Yusoff, N.D.M., Talib, N.A.A.: Log Visualization of Intrusion and Prevention Reverse Proxy Server against Web Attacks. In: Proceedings of the International Conference on Informatics and Creative Multimedia, Kuala Lumpur, Malaysia, September 3-6, pp. 325\u2013329 (2013)","DOI":"10.1109\/ICICM.2013.70"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Nishioka, C., Kozaki, M., Okada, K.: Visualization System for Log Analysis with Probabilities of Incorrect Operation. In: Proceedings of the IEEE 17th International Conference on Parallel and Distributed Systems, Tainan, Taiwan, December 7-9, pp. 929\u2013934 (2011)","DOI":"10.1109\/ICPADS.2011.147"},{"key":"3_CR11","unstructured":"Promrit, N., Mingkhwan, A., Simcharoen, S., Namvong, N.: Multi-dimensional visualization for network forensic analysis. In: Proceedings of the 7th International Conference on Networked Computing, Gumi, South Korea, September 26-28, pp. 68\u201373 (2011)"},{"key":"3_CR12","unstructured":"Schmerl, S., Vogel, M., Rietz, R., K\u00f6nig, H.: Explorative Visualization of Log Data to support Forensic Analysis and Signature Development. In: Proceedings of the Fifth International Workshop on Systematic Approaches to Digital Forensic Engineering, Oakland, CA, USA, pp. 109\u2013118 (May 10, 2010)"},{"issue":"12","key":"3_CR13","doi-asserted-by":"publisher","first-page":"2090","DOI":"10.1109\/TVCG.2013.213","volume":"19","author":"J. Schmidt","year":"2013","unstructured":"Schmidt, J., Groller, M.E., Bruckner, S.: VAICo: Visual Analysis for Image Comparison. IEEE Transactions on Visualization and Computer Graphics\u00a019(12), 2090\u20132099 (2013)","journal-title":"IEEE Transactions on Visualization and Computer Graphics"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Schrenk, G., Poisel, R.: A Discussion of Visualization Techniques for the Analysis of Digital Evidence. In: Proceedings of the Sixth International Conference on Availability, Reliability and Security, Vienna, Austria, August 22-26, pp. 758\u2013763 (2011)","DOI":"10.1109\/ARES.2011.119"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Stoll, J., Tashman, C.S., Edwards, W.K., Spafford, K.: Sesame: informing user security decisions with system visualization. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Florence, Italy, April 5-10, pp. 1045\u20131054 (2008)","DOI":"10.1145\/1357054.1357217"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Thomson, A., Graham, M., Kennedy, J.: Pianola - Visualization of Multivariate Time-Series Security Event Data. In: Proceedings of the 17th International Conference on Information Visualisation, London, UK, July 15-18 (2013)","DOI":"10.1109\/IV.2013.15"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07620-1_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T23:14:17Z","timestamp":1582413257000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07620-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319076195","9783319076201"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07620-1_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}