{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T02:10:03Z","timestamp":1743991803086,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642331909"},{"type":"electronic","value":"9783642331916"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33191-6_29","type":"book-chapter","created":{"date-parts":[[2012,8,21]],"date-time":"2012-08-21T19:47:07Z","timestamp":1345578427000},"page":"295-304","source":"Crossref","is-referenced-by-count":4,"title":["Detecting Periodicity in Serial Data through Visualization"],"prefix":"10.1007","author":[{"given":"E. N.","family":"Argyriou","sequence":"first","affiliation":[]},{"given":"A.","family":"Symvonis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/978-3-540-78243-8_13","volume-title":"VizSEC 2007","author":"F. Mansman","year":"2008","unstructured":"Mansman, F., Meier, L., Keim, D.A.: Visualization of host behavior for network security. In: VizSEC 2007, pp. 187\u2013202. Springer, Heidelberg (2008)"},{"key":"29_CR2","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1145\/1029208.1029214","volume-title":"Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC\/DMSEC 2004","author":"X. Yin","year":"2004","unstructured":"Yin, X., Yurcik, W., Treaster, M., Li, Y., Lakkaraju, K.: Visflowconnect: netflow visualizations of link relationships for security situational awareness. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC\/DMSEC 2004, pp. 26\u201334. ACM, New York (2004)"},{"key":"29_CR3","doi-asserted-by":"crossref","unstructured":"Shabtai, A., Klimov, D., Shahar, Y., Elovici, Y.: An intelligent, interactive tool for exploration and visualization of time-oriented security data. In: Proceedings of the 3rd International Workshop on Visualization for Computer Security, VizSEC 2006, pp. 15\u201322. ACM (2006)","DOI":"10.1145\/1179576.1179580"},{"key":"29_CR4","doi-asserted-by":"crossref","unstructured":"Lakkaraju, K., Yurcik, W., Lee, A.J.: Nvisionip: netflow visualizations of system state for security situational awareness. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC\/DMSEC 2004, pp. 65\u201372. ACM (2004)","DOI":"10.1145\/1029208.1029219"},{"key":"29_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-540-85933-8_18","volume-title":"Visualization for Computer Security","author":"G. Vandenberghe","year":"2008","unstructured":"Vandenberghe, G.: Network Traffic Exploration Application: A Tool to Assess, Visualize, and Analyze Network Security Events. In: Goodall, J.R., Conti, G., Ma, K.-L. (eds.) VizSec 2008. LNCS, vol.\u00a05210, pp. 181\u2013196. Springer, Heidelberg (2008)"},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"Fink, G.A., North, C.: Root polar layout of internet address data for security administration. In: Proceedings of the IEEE Workshops on Visualization for Computer Security, VIZSEC 2005, pp. 55\u201364. IEEE Computer Society (2005)","DOI":"10.1109\/VIZSEC.2005.1532066"},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"Abdullah, K., Lee, C., Conti, G., Copeland, J.A., Stasko, J.: Ids rainstorm: Visualizing ids alarms. In: Proceedings of the IEEE Workshops on Visualization for Computer Security, VIZSEC 2005, pp. 1\u201310. IEEE Computer Society (2005)","DOI":"10.1109\/VIZSEC.2005.1532060"},{"key":"29_CR8","unstructured":"Toelle, J., Niggemann, O.: Supporting intrusion detection by graph clustering and graph drawing. In. In: Proc. of 3rd Int. Workshop on Recent Advances in Intrusion Detection, RAID 2000 (2005)"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Oline, A., Reiners, D.: Exploring three-dimensional visualization for intrusion detection. In: Proceedings of the IEEE Workshops on Visualization for Computer Security, VIZSEC 2005, pp. 113\u2013120. IEEE Computer Society (2005)","DOI":"10.1109\/VIZSEC.2005.1532073"},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"Erbacher, R.F., Christensen, K., Sundberg, A.: Designing visualization capabilities for ids challenges. In: Proceedings of the IEEE Workshops on Visualization for Computer Security, VIZSEC 2005, pp. 121\u2013127. IEEE Computer Society (2005)","DOI":"10.1109\/VIZSEC.2005.1532074"},{"key":"29_CR11","doi-asserted-by":"crossref","unstructured":"Carlis, J.V., Konstan, J.A.: Interactive visualization of serial periodic data. In: Proceedings of the 11th Annual ACM Symposium on User Interface Software and Technology, UIST 1998, pp. 29\u201338. ACM (1998)","DOI":"10.1145\/288392.288399"},{"key":"29_CR12","doi-asserted-by":"crossref","unstructured":"Weber, M., Alexa, M., M\u00fcller, W.: Visualizing time-series on spirals. In: Proceedings of the IEEE Symposium on Information Visualization 2001 (INFOVIS 2001), pp. 7\u201314 (2001)","DOI":"10.1109\/INFVIS.2001.963273"},{"key":"29_CR13","doi-asserted-by":"crossref","unstructured":"Bertini, E., Hertzog, P., Lalanne, D.: Spiralview: Towards security policies assessment through visual correlation of network resources with evolution of alarms. In: Proceedings of the 2007 IEEE Symposium on Visual Analytics Science and Technology, VAST 2007, pp. 139\u2013146. IEEE Computer Society (2007)","DOI":"10.1109\/VAST.2007.4389007"},{"key":"29_CR14","doi-asserted-by":"crossref","unstructured":"Silva, S.F., Catarci, T.: Visualization of linear time-oriented data: A survey. In: Proceedings of the First International Conference on Web Information Systems Engineering (WISE 2000), vol.\u00a01, pp. 310\u2013319. IEEE Computer Society (2000)","DOI":"10.1109\/WISE.2000.882407"},{"key":"29_CR15","doi-asserted-by":"crossref","unstructured":"M\u00fcller, W., Schumann, H.: Visualization for modeling and simulation: visualization methods for time-dependent data - an overview. In: Proceedings of the 35th Conference on Winter Simulation: Driving Innovation, WSC 2003, pp. 737\u2013745 (2003)","DOI":"10.1109\/WSC.2003.1261490"},{"key":"29_CR16","doi-asserted-by":"crossref","unstructured":"Aigner, W., Bertone, A., Miksch, S., Tominski, C., Schumann, H.: Towards a conceptual framework for visual analytics of time and time-oriented data. In: Proceedings of the 39th Conference on Winter Simulation: 40 Years! The Best is Yet to Come, WSC 2007, pp. 721\u2013729 (2007)","DOI":"10.1109\/WSC.2007.4419666"},{"key":"29_CR17","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1145\/234535.234538","volume":"15","author":"R. Davidson","year":"1996","unstructured":"Davidson, R., Harel, D.: Drawing graphs nicely using simulated annealing. ACM Transactions on Graphics\u00a015, 301\u2013331 (1996)","journal-title":"ACM Transactions on Graphics"},{"key":"29_CR18","first-page":"149","volume":"42","author":"P. Eades","year":"1984","unstructured":"Eades, P.: A heuristic for graph drawing. Congressus Numerantium\u00a042, 149\u2013160 (1984)","journal-title":"Congressus Numerantium"},{"key":"29_CR19","doi-asserted-by":"publisher","first-page":"1129","DOI":"10.1002\/spe.4380211102","volume":"21","author":"T. Fruchterman","year":"1991","unstructured":"Fruchterman, T., Reingold, E.M.: Graph drawing by force-directed placement. Software-Practice and Experience\u00a021, 1129\u20131164 (1991)","journal-title":"Software-Practice and Experience"},{"key":"29_CR20","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/0020-0190(89)90102-6","volume":"31","author":"T. Kamada","year":"1989","unstructured":"Kamada, T., Kawai, S.: An algorithm for drawing general undirected graphs. Information Processing Letters\u00a031, 7\u201315 (1989)","journal-title":"Information Processing Letters"},{"key":"29_CR21","series-title":"Lecture Notes in Computer Science","volume-title":"Drawing Graphs","year":"2001","unstructured":"Kaufmann, M., Wagner, D. (eds.): Drawing Graphs. LNCS, vol.\u00a02025. Springer, Heidelberg (2001)"},{"key":"29_CR22","unstructured":"Di Battista, G., Eades, P., Tamassia, R., Tollis, I.G.: Graph Drawing: Algorithms for the Visualization of Graphs. Prentice Hall (1999)"}],"container-title":["Lecture Notes in Computer Science","Advances in Visual Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33191-6_29.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T01:35:27Z","timestamp":1743989727000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33191-6_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642331909","9783642331916"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33191-6_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}