{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T10:53:10Z","timestamp":1725533590607},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,12]]},"DOI":"10.1109\/ntms.2009.5384681","type":"proceedings-article","created":{"date-parts":[[2010,1,22]],"date-time":"2010-01-22T21:14:24Z","timestamp":1264194864000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["A Visualization Framework for Traffic Data Exploration and Scan Detection"],"prefix":"10.1109","author":[{"given":"Mai","family":"El-Shehaly","sequence":"first","affiliation":[]},{"given":"Denis","family":"Gracanin","sequence":"additional","affiliation":[]},{"given":"Ayman","family":"Abdel-Hamid","sequence":"additional","affiliation":[]},{"given":"Kresimir","family":"Matkovic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/978-3-540-85933-8_11","article-title":"Large-Scale Network Monitoring for Visual Analysis of Attacks","author":"fischer","year":"2008","journal-title":"Visualization for Computer Security 5th International Workshop Vizsec 2008 Cambridge Ma USA September 15 2008 Proceedings"},{"article-title":"Nfsen: Netflow sensor. nfsen. sourceforge. net","year":"2008","author":"haag","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/32.372146"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080119"},{"key":"ref14","article-title":"A Software Architecture to support Misuse Intrusion Detection","author":"kumar","year":"1996","journal-title":"National Information Systems Security '95 (18th) Proceedings Making Security Real"},{"year":"0","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029219"},{"article-title":"A Real-time Intrusion-detection Expert System (IDES)","year":"1992","author":"lunt","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2006.1687613"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1111322.1111330"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/IV.2008.87"},{"year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2005.1495940"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029216"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2005.17"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CATCH.2009.47"},{"journal-title":"Analysts' Handbook Using SiLK for Network Traffic Analysis","year":"2006","author":"micheal collins","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/VAST.2006.261437"},{"article-title":"Flo Vis: Flow Visualization System","year":"0","author":"taylor","key":"ref9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028794"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029214"},{"key":"ref21","article-title":"FlowScan: A Network Traffic Flow Reporting and Visualization Tool","author":"plonka","year":"0","journal-title":"LISA 2000 Conference Proceedings"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1023\/A:1024600519144"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345958"}],"event":{"name":"2009 3rd International Conference on New Technologies, Mobility and Security (NTMS)","start":{"date-parts":[[2009,12,20]]},"location":"Cairo, Egypt","end":{"date-parts":[[2009,12,23]]}},"container-title":["2009 3rd International Conference on New Technologies, Mobility and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5384533\/5384652\/05384681.pdf?arnumber=5384681","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,27]],"date-time":"2020-05-27T00:23:47Z","timestamp":1590539027000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5384681\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/ntms.2009.5384681","relation":{},"subject":[],"published":{"date-parts":[[2009,12]]}}}