{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:18:35Z","timestamp":1760955515259},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2014,7,25]],"date-time":"2014-07-25T00:00:00Z","timestamp":1406246400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Vis"],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1007\/s12650-014-0213-6","type":"journal-article","created":{"date-parts":[[2014,7,24]],"date-time":"2014-07-24T05:24:01Z","timestamp":1406179441000},"page":"181-196","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["MVSec: multi-perspective and deductive visual analytics on heterogeneous network security data"],"prefix":"10.1007","volume":"17","author":[{"given":"Ying","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Xing","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Xiaoping","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Yiwen","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Mengjie","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Fangfang","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,7,25]]},"reference":[{"issue":"4","key":"213_CR1","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1145\/332051.332079","volume":"43","author":"T Bass","year":"2000","unstructured":"Bass T (2000) Intrusion detection systems and multisensor data fusion[J]. Commun ACM 43(4):99\u2013105","journal-title":"Commun ACM"},{"key":"213_CR3","doi-asserted-by":"crossref","unstructured":"Cook K, Grinstein G, Whiting M et al (2012) VAST challenge 2012: visual analytics for big data[C]. In: Proceeding of the 2012 IEEE conference on visual analytics science and technology (VAST). IEEE, New York, pp 251\u2013255","DOI":"10.1109\/VAST.2012.6400529"},{"issue":"6","key":"213_CR4","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MNET.2012.6375888","volume":"26","author":"M Dumas","year":"2012","unstructured":"Dumas M, Robert JM, McGuffin MJ (2012) Alertwheel: radial bipartite graph visualization applied to intrusion detection system alerts[J]. Netw IEEE 26(6):12\u201318","journal-title":"Netw IEEE"},{"key":"213_CR5","doi-asserted-by":"crossref","unstructured":"Erbacher RF (2012) Visualization design for immediate high-level situational assessment[C]. In: Proceedings of the ninth international symposium on visualization for cyber security. ACM, New York, pp 17\u201324","DOI":"10.1145\/2379690.2379693"},{"issue":"3","key":"213_CR6","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/MNET.2011.5772055","volume":"25","author":"A Finamore","year":"2011","unstructured":"Finamore A, Mellia M, Meo M et al (2011) Experiences of internet traffic monitoring with tstat[J]. Netw IEEE 25(3):8\u201314","journal-title":"Netw IEEE"},{"key":"213_CR7","doi-asserted-by":"crossref","unstructured":"Fink GA, Muessig P, North C (2005) Visual correlation of host processes and network traffic[C]. In: IEEE workshop on visualization for computer security, 2005 (VizSEC 05). IEEE, New York, pp 11\u201319","DOI":"10.1109\/VIZSEC.2005.1532061"},{"key":"213_CR8","doi-asserted-by":"crossref","unstructured":"Fischer F, Fuchs J, Vervier P A et al (2012) VisTracer: a visual analytics tool to investigate routing anomalies in traceroutes[C]. In: Proceedings of the ninth international symposium on visualization for cyber security. ACM, New York, pp 80\u201387","DOI":"10.1145\/2379690.2379701"},{"key":"213_CR9","doi-asserted-by":"crossref","unstructured":"Fischer F, Fuchs J, Mansmann F et al (2013) BANKSAFE: visual analytics for big data in large-scale computer networks[J]. Inform Vis","DOI":"10.1177\/1473871613488572"},{"key":"213_CR10","doi-asserted-by":"crossref","unstructured":"Ghidini G, Das S K, Gupta V (2012) Fuseviz: a framework for web-based data fusion and visualization in smart environments[C]. In: Proceeding of the 2012 IEEE ninth international conference on Mobile Adhoc and Sensor Systems (MASS). IEEE, New York, pp 468\u2013472","DOI":"10.1109\/MASS.2012.6502550"},{"key":"213_CR11","doi-asserted-by":"crossref","unstructured":"Goodall JR (2008) Introduction to visualization for computer security[M]. In: VizSEC 2007. Springer, Berlin, pp 1\u201317","DOI":"10.1007\/978-3-540-78243-8_1"},{"key":"213_CR31","first-page":"299","volume":"2011","author":"G Grinstein","year":"2011","unstructured":"Grinstein G, Cook K, Havig P et al (2011) VAST 2011 challenge: cyber security and epidemic[J]. IEEE VAST 2011:299\u2013301","journal-title":"IEEE VAST"},{"issue":"1","key":"213_CR12","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1109\/2945.981848","volume":"8","author":"S Havre","year":"2002","unstructured":"Havre S, Hetzler E, Whitney P et al (2002) Themeriver: visualizing thematic changes in large document collections[J]. IEEE Trans Vis Comput Graph\u00a08(1):9\u201320","journal-title":"IEEE Trans Vis Comput Graph"},{"key":"213_CR13","doi-asserted-by":"crossref","unstructured":"Koike H, Ohno K, Koizumi K (2005) Visualizing cyber attacks using IP matrix[C]. In: IEEE workshop on visualization for computer security, 2005 (VizSEC 05). IEEE, New York, pp 91\u201398","DOI":"10.1109\/VIZSEC.2005.1532070"},{"key":"213_CR14","doi-asserted-by":"crossref","unstructured":"Lakkaraju K, Yurcik W, Lee AJ (2004) NVisionIP: netflow visualizations of system state for security situational awareness[C]. In: Proceedings of the 2004 ACM workshop on visualization and data mining for computer security. ACM, New York, pp 65\u201372","DOI":"10.1145\/1029208.1029219"},{"issue":"2","key":"213_CR15","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1016\/j.jnca.2012.12.020","volume":"36","author":"B Li","year":"2013","unstructured":"Li B, Springer J, Bebis G et al (2013) A survey of network flow applications[J]. J Netw Comput Appl 36(2):567\u2013581","journal-title":"J Netw Comput Appl"},{"key":"213_CR16","doi-asserted-by":"crossref","unstructured":"Livnat Y, Agutter J, Moon S et al (2005) Visual correlation for situational awareness[C]. In: IEEE symposium on information visualization, 2005. INFOVIS 2005. IEEE, New York, pp 95\u2013102","DOI":"10.1109\/INFVIS.2005.1532134"},{"issue":"6","key":"213_CR17","doi-asserted-by":"crossref","first-page":"1105","DOI":"10.1109\/TVCG.2007.70522","volume":"13","author":"F Mansmann","year":"2007","unstructured":"Mansmann F, Keim DA, North SC et al (2007a) Visual analysis of network traffic for resource planning, interactive monitoring, and interpretation of security threats[J]. IEEE Trans Vis Comput Graph\u00a013(6):1105\u20131112","journal-title":"IEEE Trans Vis Comput Graph"},{"issue":"6","key":"213_CR18","doi-asserted-by":"crossref","first-page":"1105","DOI":"10.1109\/TVCG.2007.70522","volume":"13","author":"F Mansmann","year":"2007","unstructured":"Mansmann F, Keim DA, North SC et al (2007b) Visual analysis of network traffic for resource planning, interactive monitoring, and interpretation of security threats[J]. IEEE Trans Vis Comput Graph\u00a013(6):1105\u20131112","journal-title":"IEEE Trans Vis Comput Graph"},{"key":"213_CR19","unstructured":"Manyika J, Chui M, Brown B et al (2011) Big data: the next frontier for innovation, competition, and productivity[J]"},{"key":"213_CR20","doi-asserted-by":"crossref","unstructured":"McPherson J, Ma KL, Krystosk P et al (2004) Portvis: a tool for port-based detection of security events[C]. In: Proceedings of the 2004 ACM workshop on visualization and data mining for computer security. ACM, New York, pp 73\u201381","DOI":"10.1145\/1029208.1029220"},{"issue":"12","key":"213_CR21","doi-asserted-by":"crossref","first-page":"3448","DOI":"10.1016\/j.comnet.2007.02.001","volume":"51","author":"A Patcha","year":"2007","unstructured":"Patcha A, Park JM (2007) An overview of anomaly detection techniques: existing solutions and latest technological trends[J]. Comput Netw 51(12):3448\u20133470","journal-title":"Comput Netw"},{"key":"213_CR22","unstructured":"Plonka D (2000) FlowScan: a network traffic flow reporting and visualization tool[C]. In: LISA, pp 305\u2013317"},{"key":"213_CR23","doi-asserted-by":"crossref","unstructured":"Ren P, Gao Y, Li Z et al (2005) IDGraphs: intrusion detection and analysis using histographs[C]. In: IEEE Workshop on visualization for computer security, 2005. (VizSEC 05). IEEE, New York, pp 39\u201346","DOI":"10.1109\/VIZSEC.2005.1532064"},{"issue":"8","key":"213_CR24","doi-asserted-by":"crossref","first-page":"1313","DOI":"10.1109\/TVCG.2011.144","volume":"18","author":"H Shiravi","year":"2012","unstructured":"Shiravi H, Shiravi A, Ghorbani AA (2012) A survey of visualization systems for network security[J]. IEEE Trans Vis Comput Graph\u00a018(8):1313\u20131329","journal-title":"IEEE Trans Vis Comput Graph"},{"key":"213_CR25","doi-asserted-by":"crossref","unstructured":"Taylor T, Brooks S, McHugh J (2008) NetBytes viewer: an entity-based netflow visualization utility for identifying intrusive behavior[M]. In: VizSEC 2007. Springer, Berlin, pp 101\u2013114","DOI":"10.1007\/978-3-540-78243-8_7"},{"key":"213_CR26","unstructured":"Teoh ST, Ma KL, Wu SF et al (2002) Case study: interactive visualization for internet security[C]. In: Proceedings of the conference on Visualization\u201902. IEEE Computer Society, pp 505\u2013508"},{"key":"213_CR2","unstructured":"VAST Challenge 2013 (2013) Situation awareness and prospective analysis[C]. In: IEEE conference on visual analytics science and technology (VAST). IEEE, New York"},{"key":"213_CR27","doi-asserted-by":"crossref","unstructured":"Walker R, ap Cenydd L, Pop S et al (2013) Storyboarding for visual analytics[J]. Inform Vis","DOI":"10.1177\/1473871613487089"},{"key":"213_CR28","doi-asserted-by":"crossref","unstructured":"Yin X, Yurcik W, Treaster M et al (2004) VisFlowConnect: netflow visualizations of link relationships for security situational awareness[C]. In: Proceedings of the 2004 ACM workshop on visualization and data mining for computer security. ACM, New York, pp 26\u201334","DOI":"10.1145\/1029208.1029214"},{"key":"213_CR29","doi-asserted-by":"crossref","unstructured":"Zhao Y, Zhou FF, Fan XP et al (2013) IDSRadar: a real-time visualization framework for IDS alerts[J]. Sci China Inform Sci 1\u201312","DOI":"10.1007\/s11432-013-4891-9"},{"key":"213_CR30","unstructured":"VAST Challenge Homepage [EB\/OL]. http:\/\/www.vacommunity.org\/VAST+Challenge+2013"}],"container-title":["Journal of Visualization"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12650-014-0213-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12650-014-0213-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12650-014-0213-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,13]],"date-time":"2019-08-13T04:02:42Z","timestamp":1565668962000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12650-014-0213-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7,25]]},"references-count":31,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,8]]}},"alternative-id":["213"],"URL":"https:\/\/doi.org\/10.1007\/s12650-014-0213-6","relation":{},"ISSN":["1343-8875","1875-8975"],"issn-type":[{"value":"1343-8875","type":"print"},{"value":"1875-8975","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,7,25]]}}}