{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T11:27:27Z","timestamp":1749122847223},"reference-count":9,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/iv.2002.1028831","type":"proceedings-article","created":{"date-parts":[[2003,6,25]],"date-time":"2003-06-25T18:14:31Z","timestamp":1056564871000},"source":"Crossref","is-referenced-by-count":38,"title":["Tudumi: information visualization system for monitoring and auditing computer logs"],"prefix":"10.1109","author":[{"given":"T.","family":"Takada","sequence":"first","affiliation":[]},{"given":"H.","family":"Koike","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-024X(199604)26:4<399::AID-SPE8>3.0.CO;2-J"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/198366.198378"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFVIS.1997.636718"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/2945.468391"},{"key":"ref8","first-page":"25","article-title":"NetST at: A Network-based Intrusion Detection Approach","author":"giovanni","year":"1998","journal-title":"14th Annual Computer Security Applications Conference"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/32.372146"},{"key":"ref2","article-title":"Audit Log Analysis Using the Visual Audit Browser Toolkit","author":"hoagland","year":"1995","journal-title":"Technical Report (CSE-95&#x2013;11)"},{"key":"ref9","article-title":"Data Mining Approaches for Intrusion Detection","author":"lee","year":"1998","journal-title":"Proc of 7th USENIX Security Symposium"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/IV.2000.859771"}],"event":{"name":"Sixth International Conference on Information Visualisation","location":"London, UK","acronym":"IV-02"},"container-title":["Proceedings Sixth International Conference on Information Visualisation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/7989\/22105\/01028831.pdf?arnumber=1028831","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,10]],"date-time":"2017-03-10T16:22:07Z","timestamp":1489162927000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1028831\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/iv.2002.1028831","relation":{},"subject":[]}}