{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:42:26Z","timestamp":1725518546819},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540859314"},{"type":"electronic","value":"9783540859338"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-85933-8_16","type":"book-chapter","created":{"date-parts":[[2008,9,14]],"date-time":"2008-09-14T01:44:51Z","timestamp":1221356691000},"page":"161-168","source":"Crossref","is-referenced-by-count":7,"title":["Existence Plots: A Low-Resolution Time Series for Port Behavior Analysis"],"prefix":"10.1007","author":[{"given":"Jeff","family":"Janies","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Collins, M., Shimeall, T., Faber, S., Janies, J., Weaver, R., De Shon, M., Kadane, J.: Using uncleanliness to predict future botnet addresses. In: Proceedings of IMC 2007 (2007)","DOI":"10.1145\/1298306.1298319"},{"key":"16_CR2","volume-title":"Proceedings of MASCOTS 2005","author":"F. Hernandez-Campos","year":"2005","unstructured":"Hernandez-Campos, F., Nobel, A., Smith, F., Jeffay, K.: Understanding patterns of tcp connection usage with statistical clustering. In: Proceedings of MASCOTS 2005. IEEE Computer Society, Los Alamitos (2005)"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Lakkaraju, K., Yurcik, W., Lee, A.: Nvisionip: netflow visualizations of system state for security situational awareness. In: Proceedings of VizSEC 2004 (2004)","DOI":"10.1145\/1029208.1029219"},{"key":"16_CR4","unstructured":"Mansmann, F., Meier, L., Keim, D.: Visualization of host behavior for network security. In: Proceedings of VizSEC 2007 (2007)"},{"key":"16_CR5","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-3458-4","volume-title":"Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint","author":"D. Marchette","year":"2001","unstructured":"Marchette, D.: Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint. Springer, New York (2001)"},{"key":"16_CR6","volume-title":"Proceedings of VizSEC\/DMSEC 2004","author":"J. McPherson","year":"2004","unstructured":"McPherson, J., Ma, K., Krystosek, P., Bartoletti, T., Christensen, M.: Portvis: a tool for port-based detection of security events. In: Proceedings of VizSEC\/DMSEC 2004. ACM, New York (2004)"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Pang, R., Yegneswaran, V., Barford, P., Paxson, V., Peterson, L.: Characteristics of internet background radiation. In: Proceedings of IMC 2004 (2004)","DOI":"10.1145\/1028788.1028794"},{"key":"16_CR8","volume-title":"proceedings of VizSEC 2006","author":"C. Wright","year":"2006","unstructured":"Wright, C., Monrose, F., Masson, G.: Using visual motifs to classify encrypted traffic. In: proceedings of VizSEC 2006. ACM Press, New York (2006)"},{"key":"16_CR9","first-page":"107","volume":"0","author":"L. Xiao","year":"2006","unstructured":"Xiao, L., Gerth, J., Hanrahan, P.: Enhancing visual analysis of network traffic using a knowledge representation. VAST\u00a00, 107\u2013114 (2006)","journal-title":"VAST"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Yegneswaran, V., Barford, P., Ullrich, J.: Internet intrusions: Global characteristics and prevalence. In: Proceedings of ACM SIGMETRICS 2003 (2003)","DOI":"10.1145\/781027.781045"},{"key":"16_CR11","volume-title":"Proceedings of VizSEC\/DMSEC 2004","author":"X. Yin","year":"2004","unstructured":"Yin, X., Yurcik, W., Treaster, M., Li, Y., Lakkaraju, K.: Visflowconnect: netflow visualizations of link relationships for security situational awareness. In: Proceedings of VizSEC\/DMSEC 2004. ACM Press, New York (2004)"}],"container-title":["Lecture Notes in Computer Science","Visualization for Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85933-8_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:55:27Z","timestamp":1619510127000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85933-8_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540859314","9783540859338"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85933-8_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}