{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T17:40:08Z","timestamp":1751650808557,"version":"3.41.0"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,5,21]],"date-time":"2018-05-21T00:00:00Z","timestamp":1526860800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61402540"],"award-info":[{"award-number":["61402540"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1007\/s11277-018-5808-0","type":"journal-article","created":{"date-parts":[[2018,5,21]],"date-time":"2018-05-21T12:47:35Z","timestamp":1526906855000},"page":"2127-2142","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Seeflow: A Visualization System Using 2T Hybrid Graph for Characteristics Analysis of Abnormal Netflow"],"prefix":"10.1007","volume":"101","author":[{"given":"Sheng","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Ronghua","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Jue","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,21]]},"reference":[{"issue":"8","key":"5808_CR1","first-page":"167","volume":"24","author":"JB Lai","year":"2007","unstructured":"Lai, J. B., Wang, H. Q., & Jin, S. (2007). Study of network security situation awareness system based on Netflow. Application Research of Computers, 24(8), 167\u2013172.","journal-title":"Application Research of Computers"},{"issue":"2","key":"5808_CR2","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1016\/j.jnca.2012.12.020","volume":"36","author":"B Li","year":"2013","unstructured":"Li, B., Springer, J., Bebis, G., & Gunes, M. H. (2013). A survey of network flow applications. Journal of Network and Computer Applications, 36(2), 567\u2013581.","journal-title":"Journal of Network and Computer Applications"},{"issue":"3","key":"5808_CR3","doi-asserted-by":"publisher","first-page":"103","DOI":"10.5539\/cis.v2n3p103","volume":"2","author":"H Zhang","year":"2009","unstructured":"Zhang, H. (2009). Study on the TOPN abnormal detection based on the netflow data set. Computer and Information Science, 2(3), 103\u2013108.","journal-title":"Computer and Information Science"},{"key":"5808_CR4","unstructured":"Hsiao HW, Chen DN, Wu TJ. (2010). Detecting hiding malicious website using network traffic mining approach. In 2nd international conference on education technology and computer (ICETC),vol. 5, V5-276-V5-280"},{"key":"5808_CR5","doi-asserted-by":"crossref","unstructured":"Yin K and Zhu J. (2011). A novel DoS detection mechanism, in 2011 international conference on mechatronic science, electric engineering and computer (MEC), 296-298.","DOI":"10.1109\/MEC.2011.6025459"},{"key":"5808_CR6","doi-asserted-by":"crossref","unstructured":"Sperotto, A. & Pras, A. (2011). Flow-based intrusion detection. In 2011 IFIP\/IEEE International Symposium on Integrated Network Management (pp. 958\u2013963).","DOI":"10.1109\/INM.2011.5990529"},{"key":"5808_CR7","doi-asserted-by":"crossref","unstructured":"Francois J, Wang S, Bronzi W, State R, Engel T. (2011). BotCloud: detecting botnets using MapReduce. In 2011 IEEE international workshop on information forensics and security (WIFS), (pp. 1\u20136).","DOI":"10.1109\/WIFS.2011.6123125"},{"key":"5808_CR8","doi-asserted-by":"crossref","unstructured":"Lakkaraju, K., Bearavolu, R., Slagell, A., Yurcik, W., North S. (2005). Closing-the-loop in nvisionip: integrating discovery and search in security visualizations. In Visualization for Computer Security, (pp. 75\u201382).","DOI":"10.1109\/VIZSEC.2005.3"},{"key":"5808_CR9","unstructured":"Taylor, T., Brook S and McHugh J. (2007). Netbytes viewer: An entity-based netflow visualization utility for identifying intru-sive behavior. In The 4th International Workshop on Visualization for Cyber Security, pp. 101\u2013114."},{"key":"5808_CR10","doi-asserted-by":"crossref","unstructured":"Fischer, F., Mansmann, F., Keim, D. A., Pietzko, S., Waldvogel, M. (2008). Large-scale network monitoring for visual analysis of attacks. In 5th international workshop on Visualization for Computer Security, (pp. 111\u2013118).","DOI":"10.1007\/978-3-540-85933-8_11"},{"key":"5808_CR11","doi-asserted-by":"crossref","unstructured":"Boschetti A, Salgarelli L, Muelder C, Ma KL. (2011). TVi: a visual querying system for network monitoring and anomaly detection. In Proceedings of the 8th International Symposium on Visualization for Cyber Security, (pp. 1\u201310).","DOI":"10.1145\/2016904.2016905"},{"issue":"1","key":"5808_CR12","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s00607-013-0286-4","volume":"96","author":"L Braun","year":"2014","unstructured":"Braun, L., Volke, M., Schlamp, J., Bodisco, A., & Carle, G. (2014). Flow-inspector: a framework for visualizing network flow data using current web technologies. Computing, 96(1), 15\u201326.","journal-title":"Computing"},{"key":"5808_CR13","doi-asserted-by":"crossref","unstructured":"Zhou, F., Shi, R., & Zhao, Y. (2013). NetSecRadar: A visualization system for network security situational awareness. In IEEE Conference on Visual Analytics Science and Technology (VAST 2012) (pp. 403\u2013416).","DOI":"10.1007\/978-3-319-03584-0_30"},{"issue":"4","key":"5808_CR14","first-page":"8","volume":"7","author":"JM Michael","year":"2011","unstructured":"Michael, J. M., & Zhao, S. (2011). Hybrid Visualization for Tree and Network Structures. Communications for the CCF, 7(4), 8\u201313.","journal-title":"Communications for the CCF"},{"issue":"1","key":"5808_CR15","first-page":"1","volume":"1","author":"H Shiravi","year":"2011","unstructured":"Shiravi, H., Shiravi, A., & Ghorbani, A. A. (2011). A survey of visualization systems for network security. IEEE Transactions on Visualization and Computer Graphics, 1(1), 1\u201319.","journal-title":"IEEE Transactions on Visualization and Computer Graphics"},{"issue":"9","key":"5808_CR16","first-page":"1113","volume":"24","author":"X Zhang","year":"2012","unstructured":"Zhang, X., & Yuan, X. (2012). Treemap visualization. Journal of Computer-Aided Design & Computer Graphics, 24(9), 1113\u20131124.","journal-title":"Journal of Computer-Aided Design & Computer Graphics"},{"key":"5808_CR17","unstructured":"Krstajic M and Keim DA. (2013). Visualization of streaming data: Observing change and context in information visualization techniques. In 2013 IEEE International Conference on Big Data IEEE: Silicon Valley, (pp. 41\u201347)."},{"key":"5808_CR18","doi-asserted-by":"crossref","unstructured":"Wang, Z. & Yuan, X. (2014). Urban trajectory timeline visualization. In 2014 International Conference on Big Data and Smart Computing (BIGCOMP) Bangkok, (pp. 13\u201318).","DOI":"10.1109\/BIGCOMP.2014.6741397"},{"issue":"12","key":"5808_CR19","doi-asserted-by":"publisher","first-page":"2432","DOI":"10.1109\/TVCG.2011.179","volume":"17","author":"M Krstajic","year":"2011","unstructured":"Krstajic, M., Bertini, E., & Keim, D. A. (2011). Cloudlines: Compact display of event episodes in multiple time-series. IEEE Transactions on Visualization and Computer Graphics, 17(12), 2432\u20132439.","journal-title":"IEEE Transactions on Visualization and Computer Graphics"},{"issue":"12","key":"5808_CR20","doi-asserted-by":"publisher","first-page":"2669","DOI":"10.1109\/TVCG.2012.253","volume":"18","author":"C Shi","year":"2012","unstructured":"Shi, C., Cui, W., Liu, S., & Xu, P. (2012). RankExplorer: visualization of ranking changes in large time series data. IEEE Transactions on Visualization and Computer Graphics, 18(12), 2669\u20132678.","journal-title":"IEEE Transactions on Visualization and Computer Graphics"},{"issue":"11","key":"5808_CR21","first-page":"1623","volume":"25","author":"Y Chen","year":"2013","unstructured":"Chen, Y., Hu, H., & Li, Z. (2013). Performance compare and optimazation of ractangular treemap layout algorithms. Journal of Computer-Aided Design & Computer Graphics, 25(11), 1623\u20131634.","journal-title":"Journal of Computer-Aided Design & Computer Graphics"},{"key":"5808_CR22","doi-asserted-by":"crossref","unstructured":"Stoffel, F., Fischer, F., & Keim, D. A. (2013). Finding anomalies in time-series using visual correlation for interactive root cause analysis. In Proceedings of the Tenth Workshop on Visualization for Cyber Security ACM (pp. 65\u201372).","DOI":"10.1145\/2517957.2517966"},{"issue":"5","key":"5808_CR23","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1016\/j.cose.2008.12.003","volume":"28","author":"H Choi","year":"2009","unstructured":"Choi, H., Lee, H., & Kim, H. (2009). Fast detection and visualization of network attacks on parallel coordinates. Computers Security, 28(5), 276\u2013288.","journal-title":"Computers Security"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-018-5808-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5808-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5808-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T17:14:42Z","timestamp":1751649282000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-018-5808-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,21]]},"references-count":23,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,8]]}},"alternative-id":["5808"],"URL":"https:\/\/doi.org\/10.1007\/s11277-018-5808-0","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2018,5,21]]},"assertion":[{"value":"21 May 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}