{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T12:10:02Z","timestamp":1749557402486,"version":"3.41.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319455068"},{"type":"electronic","value":"9783319455075"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45507-5_10","type":"book-chapter","created":{"date-parts":[[2016,8,22]],"date-time":"2016-08-22T11:11:04Z","timestamp":1471864264000},"page":"141-157","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Visualization Model for Monitoring of Computer Networks Security Based on the Analogue of Voronoi Diagrams"],"prefix":"10.1007","author":[{"given":"Maxim","family":"Kolomeets","sequence":"first","affiliation":[]},{"given":"Andrey","family":"Chechulin","sequence":"additional","affiliation":[]},{"given":"Igor","family":"Kotenko","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,23]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Wang, M., Woodruff, A., Kuchinsky, A.: Guidelines for using multiple views in information visualization. J. Adv. Vis. Interfaces, 110\u2013119 (2000)","DOI":"10.1145\/345513.345271"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Shi, L., Liao, Q., Sun, X., Chen, Y., Lin, C.: Scalable network traffic visualization using compressed graphs. In: Proceedings of the IEEE International Conference on Big Data (BigData 2013), Santa Clara, CA (2013)","DOI":"10.1109\/BigData.2013.6691629"},{"key":"10_CR3","volume-title":"Visual Explanations","author":"E Tufte","year":"1997","unstructured":"Tufte, E.: Visual Explanations. Graphics Press, Cheshire (1997)"},{"key":"10_CR4","unstructured":"Klyshinskij, J., Rysakov, S., Shihov, A.: Review of the methods of multidimensional data visualization. J. New Inf. Technol. Autom. Syst., 519\u2013530 (2014)"},{"key":"10_CR5","volume-title":"Applied Security Visualization","author":"R Marty","year":"2009","unstructured":"Marty, R.: Applied Security Visualization. Addison Wesley Professional, Reading (2009)"},{"key":"10_CR6","unstructured":"Kwan-Liu, M.: Cyber security through visualization. In: Asia Pacific Symposium on Information Visualisation, Tokyo, Japan (2006)"},{"key":"10_CR7","unstructured":"Noel, S., Jajodia, S.: Understanding complex network attack graphs through clustered adjacency matrices. In: 21st Annual Computer Security Applications Conference (ACSAC 2005). IEEE Computer Society (2005)"},{"issue":"6","key":"10_CR8","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/990680.990699","volume":"47","author":"S Lau","year":"2004","unstructured":"Lau, S.: The spinning cube of potential doom. Commun. ACM 47(6), 24\u201326 (2004)","journal-title":"Commun. ACM"},{"key":"10_CR9","unstructured":"Harrison, L., Spahn, R., Iannacone, M., Downing, E., Goodall, J.: Nessus vulnerability visualization for the web. In: VizSec 2012, Seattle, WA, USA (2012)"},{"key":"10_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-540-85933-8_5","volume-title":"Visualization for Computer Security","author":"L Williams","year":"2008","unstructured":"Williams, L., Lippmann, R., Ingols, K.: GARNET: a graphical attack graph and reachability network evaluation tool. In: Goodall, J.R., Conti, G., Ma, K.-L. (eds.) VizSec 2008. LNCS, vol. 5210, pp. 44\u201359. Springer, Heidelberg (2008)"},{"issue":"4","key":"10_CR11","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1109\/TST.2012.6297585","volume":"17","author":"M McGuffin","year":"2012","unstructured":"McGuffin, M.: Simple algorithms for network visualization: a tutorial. J. Tsinghua Sci. Technol. 17(4), 383\u2013398 (2012)","journal-title":"J. Tsinghua Sci. Technol."},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Novikova, E., Kotenko, I.: Analytical visualization techniques for security information and event management. In: 21st Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2013), Belfast (2013)","DOI":"10.1109\/PDP.2013.84"},{"key":"10_CR13","unstructured":"Montemayor, J., Freeman, A., Gersh, J., Llanso, T., Patrone, D.: Information visualisation for rule-based resource access control. In: International Symposium on Usable Privacy and Security (SOUPS) (2006)"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Glatz, E., Mavromatidis, S., Ager, B., Dimitropoulos, X.: Visualizing big network traffic data using frequent pattern mining and hypergraphs. In: Proceedings of the First IMC Workshop on Internet Visualization (WIV 2012), Boston, MA, USA (2012)","DOI":"10.1007\/s00607-013-0282-8"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Mansmann, F., Fischer, F., Keim, D.A., North, S.C.: Visual support for analyzing network traffic and intrusion detection events using treemap and graph representations. In: Proceedings of the Symposium on Computer Human Interaction for the Management of Information Technology (CHiMiT 2009), vol. 3, pp. 19\u201328 (2009)","DOI":"10.1145\/1641587.1641590"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Kotenko, I., Chechulin, A.: Common framework for attack modeling and security evaluation in SIEM systems. In: 2012 IEEE International Conference on Green Computing and Communications, Conference on Internet of Things, and Conference on Cyber, Physical and Social Computing, Besan\u00e7on, France (2012)","DOI":"10.1109\/GreenCom.2012.24"},{"issue":"4","key":"10_CR17","first-page":"60","volume":"5","author":"M Kolomeec","year":"2015","unstructured":"Kolomeec, M., Chechulin, A., Kotenko, I.: Methodological primitives for phased construction of data visualization models. J. Internet Serv. Inf. Secur. (JISIS) 5(4), 60\u201384 (2015)","journal-title":"J. Internet Serv. Inf. Secur. (JISIS)"},{"key":"10_CR18","doi-asserted-by":"publisher","DOI":"10.1142\/8685","volume-title":"Voronoi Diagrams and Delaunay Triangulations","author":"F Aurenhammer","year":"2013","unstructured":"Aurenhammer, F., Klein, R., Lee, D.: Voronoi Diagrams and Delaunay Triangulations. World Scientific Publishing Co., Singapore (2013)"}],"container-title":["Lecture Notes in Computer Science","Availability, Reliability, and Security in Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45507-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T11:34:32Z","timestamp":1749555272000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45507-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319455068","9783319455075"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45507-5_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"23 August 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CD-ARES","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Availability, Reliability, and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Salzburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 August 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ieeeares2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}