{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T21:06:13Z","timestamp":1746479173101,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/cybersa.2017.8073400","type":"proceedings-article","created":{"date-parts":[[2017,10,25]],"date-time":"2017-10-25T15:19:08Z","timestamp":1508944748000},"page":"1-4","source":"Crossref","is-referenced-by-count":4,"title":["Visualizing network events in a muggle friendly way"],"prefix":"10.1109","author":[{"given":"Outi-Marja","family":"Latvala","sequence":"first","affiliation":[]},{"given":"Tommi","family":"Keranen","sequence":"additional","affiliation":[]},{"given":"Sami","family":"Noponen","sequence":"additional","affiliation":[]},{"given":"Niko","family":"Lehto","sequence":"additional","affiliation":[]},{"given":"Mirko","family":"Sailio","sequence":"additional","affiliation":[]},{"given":"Mikko","family":"Valta","sequence":"additional","affiliation":[]},{"given":"Pia","family":"Olli","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1145\/1029208.1029219"},{"key":"ref11","first-page":"505","article-title":"Case study: Interactive visualization for internet security","author":"teoh","year":"2002","journal-title":"Proceedings of the Conference on Visualization &#x2018;01"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/IAW.2005.1495939"},{"key":"ref13","first-page":"1","article-title":"IDS RainStorm: Visualizing IDS alarms","author":"abdullah","year":"2005","journal-title":"VizSE C Citeseer"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/DISCEX.2001.932232"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/381641.381653"},{"year":"0","journal-title":"SNORT","key":"ref16"},{"year":"0","journal-title":"Barnyard2","key":"ref17"},{"year":"1999","author":"card","journal-title":"Readings in Information Visualization Using Vision To Think","key":"ref4"},{"year":"0","journal-title":"Die lage der it-sicherheit in deutschland 2014","key":"ref3"},{"year":"2009","author":"marty","journal-title":"Applied Security Visualization","key":"ref6"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1201\/b11371","author":"endsley","year":"2016","journal-title":"Designing for Situation Awareness An Approach to User-Centered Design"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/TVCG.2011.144"},{"year":"2007","author":"conti","journal-title":"Security Data Visualization Graphical Techniques for Network Analysis","key":"ref7"},{"key":"ref2","first-page":"6","article-title":"W32. stuxnet dossier","volume":"5","author":"falliere","year":"2011","journal-title":"White Paper Symantec Corp Security Response"},{"key":"ref1","article-title":"Industrial Network Security: Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems","author":"knapp","year":"2014","journal-title":"Syngress"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/CyberSA.2016.7503278"}],"event":{"name":"2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","start":{"date-parts":[[2017,6,19]]},"location":"London, United Kingdom","end":{"date-parts":[[2017,6,20]]}},"container-title":["2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8055134\/8073382\/08073400.pdf?arnumber=8073400","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T00:35:11Z","timestamp":1570235711000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8073400\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/cybersa.2017.8073400","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}