{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T17:40:04Z","timestamp":1770918004464,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"2-3","license":[{"start":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T00:00:00Z","timestamp":1675123200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T00:00:00Z","timestamp":1675123200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Sign Process Syst"],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1007\/s11265-023-01836-0","type":"journal-article","created":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T10:03:15Z","timestamp":1675159395000},"page":"393-405","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["An Interactive Visualization System for Network Security Data"],"prefix":"10.1007","volume":"95","author":[{"given":"Li","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Gang","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Yuntian","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,31]]},"reference":[{"key":"1836_CR1","doi-asserted-by":"crossref","unstructured":"Qiu, M., Xue, C., Shao, Z., et al. (2006). Efficient algorithm of energy minimization for heterogeneous wireless sensor network. IEEE EUC, 25\u201334.","DOI":"10.1007\/11802167_5"},{"issue":"12","key":"1836_CR2","first-page":"1565","volume":"72","author":"J Niu","year":"2012","unstructured":"Niu, J., Gao, Y., Qiu, M., & Ming, Z. (2012). Selecting proper wireless network interfaces for user experience enhancement with guaranteed probability. JPDC, 72(12), 1565\u20131575.","journal-title":"JPDC"},{"key":"1836_CR3","unstructured":"Zhang, Y. L. (2022). Network security data visualization fusion analysis method based on multivariate heterogeneous. Electronic Technology and Software Engineering, (15), 5\u20138."},{"issue":"2","key":"1836_CR4","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1109\/MNET.001.1900243","volume":"34","author":"H Qiu","year":"2019","unstructured":"Qiu, H., Qiu, M., & Lu, R. (2019). Secure V2X communication network based on intelligent PKI and edge computing. IEEE Network, 34(2), 172\u2013178.","journal-title":"IEEE Network"},{"key":"1836_CR5","doi-asserted-by":"crossref","unstructured":"Qiu, H., Zeng, Y., et al. (2021). Deepsweep: An evaluation framework for mitigating DNN backdoor attacks using data augmentation.\u00a0ACM Asia Conference on Computer and Communications Security.","DOI":"10.1145\/3433210.3453108"},{"key":"1836_CR6","unstructured":"Hu, G. (2012). Research and Implementation of Network security log data Visual Analysis System. Beijing University of Posts and Telecommunications."},{"key":"1836_CR7","doi-asserted-by":"crossref","unstructured":"Tao, L., Golikov, S., Gai, K., & Qiu, M. (2015) A reusable software component for integrated syntax and semantic validation for services computing.\u00a0IEEE Symposium on Service-Oriented System Engineering, 127\u2013132.","DOI":"10.1109\/SOSE.2015.10"},{"issue":"1","key":"1836_CR8","first-page":"43","volume":"4","author":"M Qiu","year":"2006","unstructured":"Qiu, M., Zhang, K., & Huang, M. (2006). Usability in mobile interface browsing. Web Intelligence and Agent Systems: An International Journal, 4(1), 43\u201359.","journal-title":"Web Intelligence and Agent Systems: An International Journal"},{"issue":"3","key":"1836_CR9","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/s00530-004-0155-2","volume":"10","author":"K Zhang","year":"2005","unstructured":"Zhang, K., Kong, J., Qiu, M., & Song, G. (2005). Multimedia layout adaptation through grammatical specifications. Multimedia Systems, 10(3), 245\u2013260.","journal-title":"Multimedia Systems"},{"key":"1836_CR10","unstructured":"Qiu, M., Zhang, K., & Huang, M. (2004) An empirical study of web interface design on small display devices. IEEE\/WIC\/ACM International Conference on Web Intelligence (WI\u201904), 29\u201335."},{"key":"1836_CR11","unstructured":"Yu, X., & Yu, C. (2021). Based on the information environment of the network security data visualization study. Journal of Electronic World, (14), 49\u201350."},{"issue":"8","key":"1836_CR12","doi-asserted-by":"publisher","first-page":"1313","DOI":"10.1109\/TVCG.2011.144","volume":"18","author":"H Shiravi","year":"2011","unstructured":"Shiravi, H., Shiravi, A., & Ghorbani, A. A. (2011). A survey of visualization systems for network security. IEEE Transactions on visualization and computer graphics, 18(8), 1313\u20131329.","journal-title":"IEEE Transactions on visualization and computer graphics"},{"key":"1836_CR13","unstructured":"Zhao, Y., Fan, X., Zhou, F., Wang, F., & Zhang, J. (2014). A survey on network security data visualization. Journal of Computer Aided Design and Graphics."},{"key":"1836_CR14","unstructured":"Chen, W., Shen, Z. Q., & Tao, Y. B. (2013). Data Visualization. Publishing House of Electronics Industry."},{"issue":"16","key":"1836_CR15","doi-asserted-by":"publisher","first-page":"2809","DOI":"10.1016\/j.comnet.2010.07.015","volume":"54","author":"L Qi","year":"2010","unstructured":"Qi, L., Blaich, A., Vanbruggen, D., & Striegel, A. (2010). Managing networks through context: graph visualization and exploration. Computer Networks, 54(16), 2809\u20132824.","journal-title":"Computer Networks"},{"issue":"9","key":"1836_CR16","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1016\/j.sysarc.2011.03.005","volume":"57","author":"J Li","year":"2011","unstructured":"Li, J., Ming, Z., Qiu, M., Quan, G., Qin, X., & Chen, T. (2011). Resource allocation robustness in multi-core embedded systems with inaccurate information. Journal of Systems Architecture, 57(9), 840\u2013849.","journal-title":"Journal of Systems Architecture"},{"key":"1836_CR17","doi-asserted-by":"crossref","unstructured":"Hu, F., Lakdawala, S., Hao, Q., & Qiu, M. (2009). Low-power, intelligent sensor hardware interface for medical data preprocessing. IEEE Transactions on Information Technology in Biomedicine, 13(4), 656\u2013663.","DOI":"10.1109\/TITB.2009.2023116"},{"key":"1836_CR18","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Liang, X., Fan, X., Wang, Y., Yang, M., & Zhou, F. (2014). Mvsec. Journal of Visualization.","DOI":"10.1007\/s12650-014-0213-6"},{"key":"1836_CR19","unstructured":"Hernan Li D. Y., & Gan, W. Y. (2007). Overview of Importance Node Mining in Complex Networks. Computer Science, 34(12), 1\u20135."},{"key":"1836_CR20","unstructured":"Rong, L. L., Guo, T. Z., & Wang, J. W. (2008). Centralities of nodes in complex networks. Journal of University of Shanghai for Science and Technology."},{"key":"1836_CR21","unstructured":"Wang, R. S. (2016). Research on Spatiotemporal Multi-dimensional data visualization in big Data environment. Zhejiang University."},{"key":"1836_CR22","doi-asserted-by":"crossref","unstructured":"Kandogan, E. (2001). Visualizing multi-dimensional clusters, trends, and outliers using star coordinates. Acm Sigkdd International Conference on Knowledge Discovery and data Mining (pp.107-116). DBLP.","DOI":"10.1145\/502512.502530"},{"issue":"3","key":"1836_CR23","first-page":"457","volume":"37","author":"C Shui","year":"2015","unstructured":"Shui, C., Cheng, T., & Li, Hui. (2015). A survey of Network Graph Automatic Layout Algorithms Based on Force-directed Model. Computer Engineering and Science, 37(3), 457\u2013465.","journal-title":"Computer Engineering and Science"},{"key":"1836_CR24","unstructured":"Zhao, L. H. (2009). Research and Implementation of Large-scale Network Topology Visualization Tool. Heilongjiang University."},{"key":"1836_CR25","unstructured":"Haviv, A. Q. (2014). Mean web development."}],"container-title":["Journal of Signal Processing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-023-01836-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11265-023-01836-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-023-01836-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,23]],"date-time":"2023-03-23T15:21:36Z","timestamp":1679584896000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11265-023-01836-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,31]]},"references-count":25,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2023,3]]}},"alternative-id":["1836"],"URL":"https:\/\/doi.org\/10.1007\/s11265-023-01836-0","relation":{},"ISSN":["1939-8018","1939-8115"],"issn-type":[{"value":"1939-8018","type":"print"},{"value":"1939-8115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,31]]},"assertion":[{"value":"25 October 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 December 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 December 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 January 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}}]}}