{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T17:55:02Z","timestamp":1760982902170,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642002182"},{"type":"electronic","value":"9783642002199"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00219-9_2","type":"book-chapter","created":{"date-parts":[[2009,2,4]],"date-time":"2009-02-04T13:03:51Z","timestamp":1233752631000},"page":"2-13","source":"Crossref","is-referenced-by-count":22,"title":["Graph Drawing for Security Visualization"],"prefix":"10.1007","author":[{"given":"Roberto","family":"Tamassia","sequence":"first","affiliation":[]},{"given":"Bernardo","family":"Palazzi","sequence":"additional","affiliation":[]},{"given":"Charalampos","family":"Papamanthou","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Ball, R., Fink, G.A., North, C.: Home-centric visualization of network traffic for security administration. In: Proc. Workshop on Visualization and Data Mining for Computer Security (VIZSEC\/DMSEC), pp. 55\u201364 (2004)","DOI":"10.1145\/1029208.1029217"},{"key":"2_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/3-540-63938-1_78","volume-title":"Graph Drawing","author":"N.S. Barghouti","year":"1997","unstructured":"Barghouti, N.S., Mocenigo, J., Lee, W.: Grappa: A GRAPh PAckage in Java. In: DiBattista, G. (ed.) GD 1997. LNCS, vol.\u00a01353, pp. 336\u2013343. Springer, Heidelberg (1997)"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Chalmers, M.: A linear iteration time layout algorithm for visualising high-dimensional data. In: Proc. Conference on Visualization (VIS), pp. 127\u2013132 (1996)","DOI":"10.1109\/VISUAL.1996.567787"},{"key":"2_CR4","volume-title":"Security Data Visualization","author":"G. Conti","year":"2007","unstructured":"Conti, G.: Security Data Visualization. No Starch Press, San Francisco (2007), http:\/\/www.rumint.org"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1007\/b13632","volume-title":"GD 2003","author":"G. Battista Di","year":"2003","unstructured":"Di Battista, G., Mariani, F., Patrignani, M., Pizzonia, M.: Bgplay: A system for visualizing the interdomain routing evolution. In: Liotta, G. (ed.) GD 2003. LNCS, vol.\u00a01353, pp. 295\u2013306. Springer, Heidelberg (2003)"},{"key":"2_CR6","first-page":"149","volume":"42","author":"P. Eades","year":"1984","unstructured":"Eades, P.: A heuristic for graph drawing. Congr. Numer.\u00a042, 149\u2013160 (1984)","journal-title":"Congr. Numer."},{"key":"2_CR7","first-page":"127","volume-title":"Graph Drawing Software","author":"J. Ellson","year":"2003","unstructured":"Ellson, J., Gansner, E.R., Koutsofios, L., North, S.C., Woodhull, G.: Graphviz and dynagraph - static and dynamic graph drawing tools. In: Graph Drawing Software, pp. 127\u2013148. Springer, Heidelberg (2003)"},{"issue":"11","key":"2_CR8","doi-asserted-by":"publisher","first-page":"1129","DOI":"10.1002\/spe.4380211102","volume":"21","author":"T. Fruchterman","year":"1991","unstructured":"Fruchterman, T., Reingold, E.: Graph drawing by force-directed placement. Softw. \u2013 Pract. Exp.\u00a021(11), 1129\u20131164 (1991)","journal-title":"Softw. \u2013 Pract. Exp."},{"key":"2_CR9","unstructured":"Girardin, L., Brodbeck, D.: A visual approach for monitoring logs. In: Proc. of USENIX Conference on System Administration (LISA), pp. 299\u2013308 (1998)"},{"key":"2_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-540-85933-8_2","volume-title":"Visualization for Computer Security","author":"A. Heitzmann","year":"2008","unstructured":"Heitzmann, A., Palazzi, B., Papamanthou, C., Tamassia, R.: Effective visualization of file system access-control. In: Goodall, J.R., Conti, G., Ma, K.-L. (eds.) VizSec 2008. LNCS, vol.\u00a05210, pp. 18\u201325. Springer, Heidelberg (2008)"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Johnson, B., Shneiderman, B.: Tree maps: A space-filling approach to the visualization of hierarchical information structures. In: Proc. Conference on Visualization (VIS), pp. 284\u2013291 (1991)","DOI":"10.1109\/VISUAL.1991.175815"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Mansmann, F., Meier, L., Keim, D.: Graph-based monitoring of host behavior for network security. In: Proc. Visualization for Cyper Security (VIZSEC), pp. 187\u2013202 (2007)","DOI":"10.1007\/978-3-540-78243-8_13"},{"key":"2_CR13","unstructured":"Montemayor, J., Freeman, A., Gersh, J., Llanso, T., Patrone, D.: Information visualization for rule-based resource access control. In: Proc. of Int. Symposium on Usable Privacy and Security (SOUPS) (2006)"},{"key":"2_CR14","unstructured":"Muelder, C., Ma, K.L., Bartoletti, T.: A visualization methodology for characterization of network scans. In: Proc. Visualization for Cyber Security (VIZSEC) (2005)"},{"key":"2_CR15","series-title":"Lecture Notes in Computer Science","first-page":"425","volume-title":"GD 2003","author":"A. Noack","year":"2003","unstructured":"Noack, A.: An energy model for visual graph clustering. In: Liotta, G. (ed.) GD 2003. LNCS, vol.\u00a01353, pp. 425\u2013436. Springer, Heidelberg (2003)"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Noel, S., Jacobs, M., Kalapa, P., Jajodia, S.: Multiple coordinated views for network attack graphs. In: Proc.Visualization for Cyber Security (VIZSEC), pp. 99\u2013106 (2005)","DOI":"10.1109\/VIZSEC.2005.1532071"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Noel, S., Jajodia, S.: Managing attack graph complexity through visual hierarchical aggregation. In: Proc. Workshop on Visualization and Data Mining for Computer Security (VIZSEC\/DMSEC), pp. 109\u2013118 (2004)","DOI":"10.1145\/1029208.1029225"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Oberheide, J., Karir, M., Blazakis, D.: VAST: Visualizing autonomous system topology. In: Proc. Visualization for Cyber Security (VIZSEC), pp. 71\u201380 (2006)","DOI":"10.1145\/1179576.1179592"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Teoh, S.T., Ranjan, S., Nucci, A., Chuah, C.N.: BGP Eye: a new visualization tool for real-time detection and analysis of BGP anomalies. In: Proc. Visualization for Cyber Security (VIZSEC), pp. 81\u201390 (2006)","DOI":"10.1145\/1179576.1179593"},{"key":"2_CR20","unstructured":"Toledo, J.: Etherape: a live graphical network monitor tool, http:\/\/etherape.sourceforge.net"},{"key":"2_CR21","series-title":"Lecture Notes in Computer Science","volume-title":"Recent Advances in Intrusion Detection","author":"J. T\u00f6lle","year":"2000","unstructured":"T\u00f6lle, J., Niggermann, O.: Supporting intrusion detection by graph clustering and graph drawing. In: Debar, H., M\u00e9, L., Wu, S.F. (eds.) RAID 2000. LNCS, vol.\u00a01907. Springer, Heidelberg (2000)"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Winsborough, W.H., Li, N.: Towards practical automated trust negotiation. In: Proc. Workshop on Policies for Distributed Systems and Networks (POLICY), pp. 92\u2013103 (2002)","DOI":"10.1109\/POLICY.2002.1011297"},{"key":"2_CR23","unstructured":"Yao, D., Shin, M., Tamassia, R., Winsborough, W.H.: Visualization of automated trust negotiation. In: Proc. Visualization for Cyber Security (VIZSEC), pp. 65\u201374 (2005)"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Yin, X., Yurcik, W., Treaster, M., Li, Y., Lakkaraju, K.: VisFlowConnect: Netflow visualizations of link relationships for security situational awareness. In: Proc. Workshop on Visualization and Data Mining for Computer Security (VizSEC\/DMSEC), pp. 26\u201334 (2004)","DOI":"10.1145\/1029208.1029214"}],"container-title":["Lecture Notes in Computer Science","Graph Drawing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00219-9_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,7]],"date-time":"2025-02-07T11:10:40Z","timestamp":1738926640000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00219-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642002182","9783642002199"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00219-9_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}