{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:29:05Z","timestamp":1730280545918,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/lcn.2012.6423586","type":"proceedings-article","created":{"date-parts":[[2013,2,8]],"date-time":"2013-02-08T21:27:47Z","timestamp":1360358867000},"page":"111-118","source":"Crossref","is-referenced-by-count":4,"title":["3DSVAT: A 3D Stereoscopic Vulnerability Assessment Tool for network security"],"prefix":"10.1109","author":[{"given":"Troy","family":"Nunnally","sequence":"first","affiliation":[]},{"given":"A. Selcuk","family":"Uluagac","sequence":"additional","affiliation":[]},{"given":"John A.","family":"Copeland","sequence":"additional","affiliation":[]},{"given":"Raheem","family":"Beyah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/329693.329695"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/329693.329695"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1279640.1279642"},{"year":"0","key":"33"},{"key":"15","first-page":"25","article-title":"Revisiting 2d vs 3d implications on spatial memory","author":"cockburn","year":"2004","journal-title":"Proceedings of the 5th Conference on Australasian User Interface"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1179576.1179583"},{"key":"13","volume":"1","author":"ware","year":"2004","journal-title":"Information Visualization Perception for Design"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/IV.2005.103"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/990680.990699"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/IV.2011.41"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-1836-4"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1179576.1179600"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2005.1532073"},{"year":"0","key":"23"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/1179576.1179592"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/NSWCTC.2009.353"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2005.1495932"},{"key":"27","first-page":"90","article-title":"Cyberseer: 3d audio-visual immersion for network security and management","author":"papadopoulos","year":"2004","journal-title":"Proc ACM Workshop Visualization and Data Mining for Computer Security (VizSec\/DMSEC '04)"},{"key":"28","article-title":"3D graph visualization prototype system for intrusion detection: A surveillance aid to security analysts","author":"xydas","year":"2006","journal-title":"Proceedings of the 9th International Conference on Computer Graphics and Artificial Intelligence"},{"year":"0","key":"29"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2009.5375543"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT.2010.5711211"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-3605-7_13"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2011.6014810"},{"year":"0","key":"30"},{"key":"7","first-page":"18","article-title":"Netvis: A network security management visualization tool based on treemap","volume":"4","author":"kan","year":"2010","journal-title":"Proceedings of the 2nd International Conference on Advanced Computer Control (ICACC)"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029232"},{"key":"32","first-page":"181","article-title":"A Case Study of 3D Stereoscopic vs. 2D Monoscopic Tele-reality in Real-time Dexterous Teleoperation","author":"keung fung","year":"2005","journal-title":"Proceedings of the IEEE International Conference On Intelligent Robots and Systems (IROS)"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2005.1532060"},{"key":"31","article-title":"Real-time teleoperation via the internet with 3d stereoscopic video feedback","author":"lo","year":"2004","journal-title":"Proceedings of the IEEE International Conference on Robotics and Automation"},{"key":"4","volume":"1","author":"friedhoff","year":"2000","journal-title":"Visual Computing"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2005.1495932"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029219"}],"event":{"name":"2012 IEEE 37th Conference on Local Computer Networks (LCN 2012)","start":{"date-parts":[[2012,10,22]]},"location":"Clearwater Beach, FL, USA","end":{"date-parts":[[2012,10,25]]}},"container-title":["37th Annual IEEE Conference on Local Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6413535\/6423567\/06423586.pdf?arnumber=6423586","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T23:55:17Z","timestamp":1490140517000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6423586\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/lcn.2012.6423586","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}