{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T23:45:59Z","timestamp":1771458359665,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/icc.2013.6654828","type":"proceedings-article","created":{"date-parts":[[2013,11,11]],"date-time":"2013-11-11T22:22:26Z","timestamp":1384208546000},"page":"2052-2057","source":"Crossref","is-referenced-by-count":19,"title":["P3D: A parallel 3D coordinate visualization for advanced network scans"],"prefix":"10.1109","author":[{"given":"Troy","family":"Nunnally","sequence":"first","affiliation":[]},{"given":"Penyen","family":"Chi","sequence":"additional","affiliation":[]},{"given":"Kulsoom","family":"Abdullah","sequence":"additional","affiliation":[]},{"given":"A. Selcuk","family":"Uluagac","sequence":"additional","affiliation":[]},{"given":"John A.","family":"Copeland","sequence":"additional","affiliation":[]},{"given":"Raheem","family":"Beyah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029220"},{"key":"22","year":"0","journal-title":"SNORT"},{"key":"17","article-title":"3D graph visualization prototype system for intrusion detection: A surveillance aid to security analysts","author":"xydas","year":"2006","journal-title":"Proceedings of the 9th International Conference on Computer Graphics and Artificial Intelligence"},{"key":"23","author":"sanfilippo","year":"2006","journal-title":"Hping2"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2005.6"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/INFVIS.2002.1173157"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/SecTech.2008.47"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029216"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.12.003"},{"key":"11","first-page":"25","article-title":"Revisiting 2d vs 3d implications on spatial memory","author":"cockburn","year":"2004","journal-title":"Proceedings of the 5th Conference on Australasian User Interface"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/329693.329695"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2012.6423586"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2011.6014810"},{"key":"20","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/978-3-540-78243-8_7","article-title":"Netbytes viewer: An entitybased netflow visualization utility for identifying intrusive behavior","author":"taylor","year":"2008","journal-title":"Proceedings of the 2007 Workshop on Visualization for Computer Security (VizSec)"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073010"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ICON.2008.4772622"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029232"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2009.5380092"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/IV.2005.103"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/2945.981847"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2009.5375543"},{"key":"9","volume":"1","author":"ware","year":"2004","journal-title":"Information Visualization Perception for Design"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/990680.990699"}],"event":{"name":"ICC 2013 - 2013 IEEE International Conference on Communications","location":"Budapest, Hungary","start":{"date-parts":[[2013,6,9]]},"end":{"date-parts":[[2013,6,13]]}},"container-title":["2013 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6637584\/6654691\/06654828.pdf?arnumber=6654828","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,7]],"date-time":"2020-08-07T18:52:23Z","timestamp":1596826343000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6654828\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icc.2013.6654828","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}