{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T06:13:16Z","timestamp":1743055996490,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319199610"},{"type":"electronic","value":"9783319199627"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-19962-7_17","type":"book-chapter","created":{"date-parts":[[2015,6,24]],"date-time":"2015-06-24T08:28:10Z","timestamp":1435134490000},"page":"289-306","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["VisRAID: Visualizing Remote Access for Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Leliel","family":"Trethowen","sequence":"first","affiliation":[]},{"given":"Craig","family":"Anslow","sequence":"additional","affiliation":[]},{"given":"Stuart","family":"Marshall","sequence":"additional","affiliation":[]},{"given":"Ian","family":"Welch","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,25]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Bertini, E., Hertzog, P., Lalanne, D.: SpiralView: towards security policies assessment through visual correlation of network resources with evolution of alarms. In: Proc. of Conference on Visual Analytics Science and Technology (VAST), pp. 139\u2013146. IEEE (2007)","DOI":"10.1109\/VAST.2007.4389007"},{"issue":"12","key":"17_CR2","doi-asserted-by":"publisher","first-page":"2301","DOI":"10.1109\/TVCG.2011.185","volume":"17","author":"M Bostock","year":"2011","unstructured":"Bostock, M., Ogievetsky, V., Heer, J.: D$$^3$$ Data-Driven Documents. IEEE Transactions on Visualization and Computer Graphics 17(12), 2301\u20132309 (2011)","journal-title":"IEEE Transactions on Visualization and Computer Graphics"},{"issue":"3","key":"17_CR3","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1057\/ivs.2009.18","volume":"8","author":"G Chin","year":"2009","unstructured":"Chin, G., Singhal, M., Nakamura, G., Gurumoorthi, V., Freeman-Cadoret, N.: Visual analysis of dynamic data streams. Information Visualization 8(3), 212\u2013229 (2009)","journal-title":"Information Visualization"},{"key":"17_CR4","unstructured":"Data Geekery. jOOQ: Get back in control of your SQL, October 30, 2013. http:\/\/jooq.org"},{"issue":"2","key":"17_CR5","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1016\/j.comnet.2004.03.033","volume":"46","author":"J Fan","year":"2004","unstructured":"Fan, J., Xu, J., Ammar, M., Moon, S.: Prefix-preserving ip address anonymization: Measurement-based security evaluation and a new cryptography-based scheme. Computer Networks 46(2), 253\u2013272 (2004)","journal-title":"Computer Networks"},{"key":"17_CR6","unstructured":"Honeynet Project. Forensic Challenge 10 - Attack Visualization, June 05, 2013. http:\/\/www.honeynet.org\/challenges\/attack_visualization_challenge"},{"issue":"2","key":"17_CR7","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MCG.2006.34","volume":"26","author":"T Itoh","year":"2006","unstructured":"Itoh, T., Takakura, H., Sawada, A., Koyamada, K.: Hierarchical visualization of network intrusion detection data. IEEE Computer Graphics Applications 26(2), 40\u201347 (2006)","journal-title":"IEEE Computer Graphics Applications"},{"issue":"1","key":"17_CR8","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1080\/10447319509526110","volume":"7","author":"JR Lewis","year":"1995","unstructured":"Lewis, J.R.: IBM computer usability satisfaction questionnaires: psychometric evaluation and instructions for use. International Journal of Human-Computer Interaction 7(1), 57\u201378 (1995)","journal-title":"International Journal of Human-Computer Interaction"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Makanju, A., Brooks, S., Zincir-Heywood, A., Milios, E.: LogView: visualizing event log clusters. In: Proc. of Conference on Privacy, Security and Trust (PST), pp. 99\u2013108. IEEE (2008)","DOI":"10.1109\/PST.2008.17"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Mukosaka, S., Koike, H.: Integrated visualization system for monitoring security in large-scale local area network. In: Proc. of the Asia-Pacific Symposium on Information Visualisation (APVIS), pp. 41\u201344. IEEE (2007)","DOI":"10.1109\/APVIS.2007.329273"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Stanton, N.: Human factors in alarm design. CRC Press (1994)","DOI":"10.1201\/9780203481714"},{"key":"17_CR12","unstructured":"Tricaud, S.: PicViz: finding a needle in a haystack. In: Proc. of the USENIX Conference on Analysis of System Logs. USENIX Association (2008)"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Xu, W., Huang, L., Fox, A., Patterson, D., Jordan, M.I.: Detecting large-scale system problems by mining console logs. In: Proc. of the Symposium on Operating Systems Principles (SIGOPS), pp. 117\u2013132. ACM (2009)","DOI":"10.1145\/1629575.1629587"},{"issue":"4","key":"17_CR14","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1002\/sec.324","volume":"5","author":"Y Zhang","year":"2012","unstructured":"Zhang, Y., Xiao, Y., Chen, M., Zhang, J., Deng, H.: A survey of security visualization for computer network logs. Security and Communication Networks 5(4), 404\u2013421 (2012)","journal-title":"Security and Communication Networks"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-19962-7_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,16]],"date-time":"2023-02-16T21:50:50Z","timestamp":1676584250000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-19962-7_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319199610","9783319199627"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-19962-7_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"25 June 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}