{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T06:22:00Z","timestamp":1763706120926,"version":"3.37.3"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T00:00:00Z","timestamp":1631145600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T00:00:00Z","timestamp":1631145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"national key research and development program of china","award":["2017YFB0701900"],"award-info":[{"award-number":["2017YFB0701900"]}]},{"DOI":"10.13039\/501100001809","name":"national natural science foundation of china","doi-asserted-by":"publisher","award":["61100053"],"award-info":[{"award-number":["61100053"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Vis"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s12650-021-00789-5","type":"journal-article","created":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T15:04:48Z","timestamp":1631199888000},"page":"175-190","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["HyIDSVis: hybrid intrusion detection visualization analysis based on rare category and association rules"],"prefix":"10.1007","volume":"25","author":[{"given":"Yanling","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Haolin","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7151-2407","authenticated-orcid":false,"given":"Xiaoju","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Chenlu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zexi","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,9]]},"reference":[{"issue":"4","key":"789_CR1","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1016\/S1389-1286(00)00139-0","volume":"34","author":"LR Aggus","year":"2000","unstructured":"Aggus LR, Morais DI, Baker RF (2000) Evaluating intrution detection systems: the 1998 darpa offline intrusion detection evaluation. Computer Netw 34(4):579\u2013595","journal-title":"Computer Netw"},{"key":"789_CR2","unstructured":"Agrawal R, Srikant R (1994) Fast algorithms for mining association rules. In: Proceedings of the 20th International Conference on Very Large Data Bases"},{"key":"789_CR3","doi-asserted-by":"crossref","unstructured":"Brahmi H, Brahmi I, Yahia SB (2012) OMC-IDS: at the cross-roads of OLAP mining and intrusion detection. In: Tan P, Chawla S, Ho CK, Bailey J (eds) Advances in Knowledge Discovery and Data Mining - 16th Pacific-Asia Conference, PAKDD 2012, Kuala Lumpur, Malaysia, May 29 - June 1, 2012, Proceedings, Part II, Springer, Lecture Notes in Computer Science, vol 7302, pp 13\u201324","DOI":"10.1007\/978-3-642-30220-6_2"},{"key":"789_CR4","doi-asserted-by":"crossref","unstructured":"Breiman (2001) Random forests. MACH LEARN 2001,45(1)(-):5\u201332","DOI":"10.1023\/A:1010933404324"},{"key":"789_CR5","doi-asserted-by":"crossref","unstructured":"Breunig MM, Kriegel HP, Ng RT, Sander J (2000) Lof: Identifying density-based local outliers. In: Acm Sigmod International Conference on Management of Data","DOI":"10.1145\/342009.335388"},{"issue":"2","key":"789_CR6","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"A Buczak","year":"2017","unstructured":"Buczak A, Guven E (2017) A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun Surv Tutor 18(2):1153\u20131176","journal-title":"IEEE Commun Surv Tutor"},{"issue":"1","key":"789_CR7","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1109\/TVCG.2015.2467196","volume":"22","author":"N Cao","year":"2016","unstructured":"Cao N, Shi C, Lin S, Lu J, Lin YR, Lin CY (2016) Targetvue: Visual analysis of anomalous user behaviors in online communication systems. IEEE Transactions V Computer Graphics 22(1):280\u20139","journal-title":"IEEE Transactions V Computer Graphics"},{"key":"789_CR8","doi-asserted-by":"crossref","unstructured":"Florez G, Bridges SA, Vaughn RB (2002) An improved algorithm for fuzzy data mining for intrusion detection. In: Annual meeting of the North American fuzzy information processing society proceedings. NAFIPS-FLINT 2002 (Cat. No. 02TH8622). IEEE, pp 457\u2013462","DOI":"10.1109\/NAFIPS.2002.1018103"},{"key":"789_CR9","unstructured":"Hettich S, Bay SD (1999) The uci kdd archive http:\/\/kdd.ics.uci.edu, irvine, CA: University of California, Department of Information and Computer Science"},{"key":"789_CR10","doi-asserted-by":"crossref","unstructured":"Huang H, He Q, Chiew K, Qian F, Ma L (2013) CLOVER: a faster prior-free approach to rare-category detection. Knowl Inf Syst 35(3):713\u2013736","DOI":"10.1007\/s10115-012-0530-9"},{"key":"789_CR11","doi-asserted-by":"publisher","first-page":"4197","DOI":"10.1016\/j.eswa.2013.12.039","volume":"41","author":"H Huang","year":"2014","unstructured":"Huang H, Chiew K, Gao Y, He Q, Li Q (2014) Rare category exploration. Expert Syst Appl 41:4197\u20134210. https:\/\/doi.org\/10.1016\/j.eswa.2013.12.039","journal-title":"Expert Syst Appl"},{"key":"789_CR12","doi-asserted-by":"publisher","unstructured":"Kim HKDHAGMLJDYKHPHK (2019) Iot network intrusion dataset. https:\/\/doi.org\/10.21227\/q70p-q449, https:\/\/dx.doi.org\/10.21227\/q70p-q449","DOI":"10.21227\/q70p-q449"},{"issue":"1","key":"789_CR13","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/273244.273257","volume":"27","author":"CM Kuok","year":"1998","unstructured":"Kuok CM, Fu A, Wong MH (1998) Mining fuzzy association rules in databases. SIGMOD Rec 27(1):41\u201346","journal-title":"SIGMOD Rec"},{"key":"789_CR14","doi-asserted-by":"crossref","unstructured":"Landstorfer J, Herrmann I, Stange JE, Drk M, Wettach R (2014) Weaving a carpet from log entries: A network security visualization built with co-creation. In: Proc. IEEE Conference on Visual Analytics Science and Technology (VAST)","DOI":"10.1109\/VAST.2014.7042483"},{"issue":"7","key":"789_CR15","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1016\/S0950-7051(02)00024-2","volume":"15","author":"J Li","year":"2002","unstructured":"Li J, Hong S, Topor R (2002) Mining the optimal class association rule set. Knowl-Based Syst 15(7):399\u2013405","journal-title":"Knowl-Based Syst"},{"issue":"1","key":"789_CR16","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1016\/j.eswa.2011.07.032","volume":"39","author":"Y Li","year":"2012","unstructured":"Li Y, Xia J, Zhang S, Yan J, Ai X, Dai K (2012) An efficient intrusion detection system based on support vector machines and gradually feature removal method. Expert Syst Appl 39(1):424\u2013430","journal-title":"Expert Syst Appl"},{"key":"789_CR17","doi-asserted-by":"crossref","unstructured":"Lin H, Gao S, Gotz D, Du F, He J, Cao N (2017) Rclens: Interactive rare category exploration and identification. IEEE Trans Visual Comput Graphics 24(7):2223\u20132237","DOI":"10.1109\/TVCG.2017.2711030"},{"key":"789_CR18","unstructured":"Liu B, Hsu W, Ma Y, Ma B (1998) Integrating classification and association rule mining. Knowl Discov Data Min 80\u201386"},{"issue":"17","key":"789_CR19","doi-asserted-by":"publisher","first-page":"7691","DOI":"10.1016\/j.eswa.2014.06.026","volume":"41","author":"Z Liu","year":"2014","unstructured":"Liu Z, Chiew K, He Q, Huang H, Huang B (2014) Prior-free rare category detection: More effective and efficient solutions. Expert Syst Appl Int J 41(17):7691\u20137706","journal-title":"Expert Syst Appl Int J"},{"key":"789_CR20","unstructured":"Panda M, Patra MR (2007) Network intrusion detection using naive bayes. Int J Comput Sci Netw Secur 7(12):258\u2013263"},{"key":"789_CR21","unstructured":"Ren P, Yan G, Li Z, Yan C, Watson B (2005) Idgraphs: Intrusion detection and analysis using histographs. In: IEEE workshop on visualization for computer security, (VizSEC 05). IEEE, pp 39\u201346"},{"key":"789_CR22","unstructured":"Song J, Takakura H, Okabe Y (2006) Description of kyoto university benchmark data[J]. https:\/\/www.takakura.com\/Kyoto_data\/BenchmarkData-Description-v5.pdf. Accessed 15 Mar 2016"},{"key":"789_CR23","doi-asserted-by":"crossref","unstructured":"Srikant R, Agrawal R (1999) Mining quantitative association rules in large relation tables. ACM SIGMOD Rec 25(2):1\u201312","DOI":"10.1145\/235968.233311"},{"issue":"2","key":"789_CR24","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1016\/j.asoc.2008.06.001","volume":"9","author":"A Tajbakhsh","year":"2009","unstructured":"Tajbakhsh A, Rahmati M, Mirzaei A (2009) Intrusion detection using fuzzy association rules. Appl Soft Comput 9(2):462\u2013469","journal-title":"Appl Soft Comput"},{"key":"789_CR25","doi-asserted-by":"crossref","unstructured":"zg\u00fcr A, Erdem H (2016) A review of kdd99 dataset usage in intrusion detection and machine learning between 2010 and 2015","DOI":"10.7287\/peerj.preprints.1954v1"},{"issue":"5","key":"789_CR26","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1109\/TSMCC.2008.923876","volume":"38","author":"J Zhang","year":"2008","unstructured":"Zhang J, Zulkernine M, Haque A (2008) Random-forests-based network intrusion detection systems. IEEE Transactions Syst Man Cybern Part C 38(5):649\u2013659","journal-title":"IEEE Transactions Syst Man Cybern Part C"},{"issue":"12","key":"789_CR27","doi-asserted-by":"publisher","first-page":"1773","DOI":"10.1109\/TVCG.2014.2346922","volume":"20","author":"J Zhao","year":"2014","unstructured":"Zhao J, Cao N, Wen Z, Song Y, Lin Y, Collins C (2014) #fluxflow: visual analysis of anomalous information spreading on social media. IEEE Transactions V Computer Graphic 20(12):1773\u20131782","journal-title":"IEEE Transactions V Computer Graphic"}],"container-title":["Journal of Visualization"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12650-021-00789-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12650-021-00789-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12650-021-00789-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,24]],"date-time":"2022-01-24T03:07:17Z","timestamp":1642993637000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12650-021-00789-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,9]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["789"],"URL":"https:\/\/doi.org\/10.1007\/s12650-021-00789-5","relation":{},"ISSN":["1343-8875","1875-8975"],"issn-type":[{"type":"print","value":"1343-8875"},{"type":"electronic","value":"1875-8975"}],"subject":[],"published":{"date-parts":[[2021,9,9]]},"assertion":[{"value":"8 July 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 August 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 September 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}