{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T04:13:50Z","timestamp":1749615230907,"version":"3.41.0"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319467702"},{"type":"electronic","value":"9783319467719"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-46771-9_27","type":"book-chapter","created":{"date-parts":[[2016,9,27]],"date-time":"2016-09-27T07:52:58Z","timestamp":1474962778000},"page":"202-209","source":"Crossref","is-referenced-by-count":2,"title":["NetflowVis: A Temporal Visualization System for Netflow Logs Analysis"],"prefix":"10.1007","author":[{"given":"Likun","family":"He","sequence":"first","affiliation":[]},{"given":"Binbin","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Min","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Binbin","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Weidong","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,28]]},"reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"Andrews, D.F.: Plots of high-dimensional data. Biometrics, pp. 125\u2013136 (1972)","DOI":"10.2307\/2528964"},{"key":"27_CR2","doi-asserted-by":"crossref","unstructured":"Chen, S., Guo, C., Yuan, X., Merkle, F., Schaefer, H., Ertl, T.: Oceans: online collaborative explorative analysis on network security. In: Proceedings of the Eleventh Workshop on Visualization for Cyber Security, pp. 1\u20138. ACM (2014)","DOI":"10.1145\/2671491.2671493"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Havre, S., Hetzler, B., Nowell, L.: Themeriver: visualizing theme changes over time. In: Proceedings of the IEEE Symposium on Information Vizualization 2000, pp. 115\u2013123 (2000)","DOI":"10.1109\/INFVIS.2000.885098"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Huang, M., Huang, W. (eds.): Innovative Approaches of Data Visualization and Visual Analytics. IGI Global, 464 pages (2014)","DOI":"10.4018\/978-1-4666-4309-3"},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Inselberg, A., Dimsdale, B.: Parallel coordinates: a tool for visualizing multi-dimensional geometry, San Francisco, pp. 361\u2013375 (1990)","DOI":"10.1109\/VISUAL.1990.146402"},{"key":"27_CR6","unstructured":"Kandogan, E.: Star coordinates: a multi-dimensional visualization technique with uniform treatment of dimensions. In: Proceedings of the IEEE Information Visualization Symposium, vol. 650, p. 22. Citeseer (2000)"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"Lakkaraju, K., Yurcik, W., Lee, A.J.: NVisionIP: netflow visualizations of system state for security situational awareness. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, pp. 65\u201372. ACM (2004)","DOI":"10.1145\/1029208.1029219"},{"issue":"4","key":"27_CR8","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1016\/j.jvlc.2010.05.002","volume":"21","author":"LF Lu","year":"2010","unstructured":"Lu, L.F., Zhang, J.W., Huang, M.L., Fu, L.: A new concentric-circle visualization of multi-dimensional data and its application in network security. J. Visual Lang. Comput. 21(4), 194\u2013208 (2010)","journal-title":"J. Visual Lang. Comput."},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Promrit, N., Mingkhwan, A.: Traffic flow classification and visualization for network forensic analysis. In: IEEE 29th International Conference on Advanced Information Networking and Applications (AINA), pp. 358\u2013364. IEEE (2015)","DOI":"10.1109\/AINA.2015.207"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Stoffel, F., Fischer, F., Keim, D.A.: Finding anomalies in time-series using visual correlation for interactive root cause analysis. In: Proceedings of the Tenth Workshop on Visualization for Cyber Security, pp. 65\u201372. ACM (2013)","DOI":"10.1145\/2517957.2517966"},{"key":"27_CR11","doi-asserted-by":"crossref","unstructured":"Yin, X., Yurcik, W., Treaster, M., Li, Y., Lakkaraju, K.: VisFlowConnect: netflow visualizations of link relationships for security situational awareness. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, pp. 26\u201334. ACM (2004)","DOI":"10.1145\/1029208.1029214"}],"container-title":["Lecture Notes in Computer Science","Cooperative Design, Visualization, and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-46771-9_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T21:30:06Z","timestamp":1749591006000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-46771-9_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319467702","9783319467719"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-46771-9_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}