{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:21:21Z","timestamp":1730211681155,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/csnet.2018.8602913","type":"proceedings-article","created":{"date-parts":[[2019,1,8]],"date-time":"2019-01-08T20:10:27Z","timestamp":1546978227000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["A Human-Centred Model for Network Flow Analysis"],"prefix":"10.1109","author":[{"given":"Thibaud","family":"Merien","sequence":"first","affiliation":[]},{"given":"David","family":"Brosset","sequence":"additional","affiliation":[]},{"given":"Xavier","family":"Bellekens","sequence":"additional","affiliation":[]},{"given":"Christophe","family":"Claramunt","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1145\/1029208.1029214","article-title":"Visfiowconnect: netfiow visualizations of link relationships for security situational awareness","author":"yin","year":"2004","journal-title":"Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com:20060169"},{"key":"ref30","first-page":"390","article-title":"A survey on various cyber attacks and their classification","volume":"15","author":"uma","year":"2013","journal-title":"IJ Network Security"},{"journal-title":"Technical report IBM Security","article-title":"Cost of Data Breach Study","year":"2017","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/e16126602"},{"key":"ref12","article-title":"Functional and structural analysis of an urban space extended from space syntax","author":"jguirim","year":"2014","journal-title":"8th International Conference on Geographic Information Science"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1068\/b306"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1179\/caj.2000.37.2.117"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029219"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.340"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1233341.1233399"},{"key":"ref18","first-page":"188","article-title":"A taxonomy of technical attribution techniques for cyber attacks","author":"nicholson","year":"2012","journal-title":"2nd European Conference on Information Warfare and Security"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2010.32"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1882471.1882474"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.2307\/2094589"},{"key":"ref27","first-page":"2","article-title":"Graph drawing for security visualization","author":"tamassia","year":"2008","journal-title":"International Symposium on Graph Drawing"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2160000"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/978-3-642-10772-6_3","article-title":"The wombat attack attribution method: some results","author":"dacier","year":"2009","journal-title":"International Conference on Information Systems Security"},{"key":"ref29","article-title":"Supporting intrusion detection by graph clustering and graph drawing","author":"t\u00f6lle","year":"2000","journal-title":"Proceedings of Third International Workshop on Recent Advances in Intrusion Detection RAID 2000"},{"journal-title":"Attribution of cyber attacks on industrial control systems","year":"2016","author":"cook","key":"ref5"},{"key":"ref8","first-page":"139","article-title":"Bot-miner: Clustering analysis of network traffic for protocol-and structure-independent botnet detection","volume":"5","author":"gu","year":"2008","journal-title":"USENIX Security Symposium"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78243-8_1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(84)90008-0"},{"key":"ref9","first-page":"1030","article-title":"Criminals and cyber attacks: The missing link between attribution and deterrence","volume":"6","author":"guitton","year":"2012","journal-title":"International Journal of Cyber Criminology"},{"journal-title":"Observation caract&#x00E9;risation et mod&#x00E9;lisation de processus d'attaques sur Internet","year":"2007","author":"alata","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1177\/0022427810365903"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44124-5_7"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1852666.1852698"},{"key":"ref24","volume":"1","author":"spitzner","year":"2003","journal-title":"Honeypots Tracking Hackers"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1485"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2016.7739583"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-68768-1_1"}],"event":{"name":"2018 2nd Cyber Security in Networking Conference (CSNet)","start":{"date-parts":[[2018,10,24]]},"location":"Paris","end":{"date-parts":[[2018,10,26]]}},"container-title":["2018 2nd Cyber Security in Networking Conference (CSNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8574117\/8602668\/08602913.pdf?arnumber=8602913","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T20:44:47Z","timestamp":1643143487000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8602913\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/csnet.2018.8602913","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}