{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T10:43:36Z","timestamp":1742381016929},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,10]]},"DOI":"10.1109\/vast.2007.4389007","type":"proceedings-article","created":{"date-parts":[[2008,1,9]],"date-time":"2008-01-09T19:19:42Z","timestamp":1199906382000},"page":"139-146","source":"Crossref","is-referenced-by-count":30,"title":["SpiralView: Towards Security Policies Assessment through Visual Correlation of Network Resources with Evolution of Alarms"],"prefix":"10.1109","author":[{"given":"Enrico","family":"Bertini","sequence":"first","affiliation":[]},{"given":"Patrick","family":"Hertzog","sequence":"additional","affiliation":[]},{"given":"Denis","family":"Lalanne","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/2945.773807"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1179576.1179596"},{"key":"ref12","article-title":"Starmine: A visualization system for cyber attacks","author":"hideshima","year":"2006","journal-title":"Proceedings of Asia-Pacific symposium on Information visualization"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029232"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029219"},{"key":"ref15","first-page":"19","article-title":"Empirical comparison of dynamic query sliders and brushing histograms","author":"li","year":"2003","journal-title":"Proc 2003 IEEE Symp Information Visualization"},{"key":"ref16","first-page":"22","article-title":"Case study: Visualizing time related events for intrusion detection","author":"mundiandy","year":"2001","journal-title":"Proc IEEE Symp Information Visualization 2001"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/S0953-5438(98)00022-8"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1201\/9780203481714"},{"key":"ref19","article-title":"Mielog: A highly interactive visual log browser using information visualization and statistical analysis","author":"takada","year":"2002","journal-title":"Proceedings of Sixteenth Systems Administration Conference"},{"key":"ref4","first-page":"55","article-title":"Color use guidelines for data representation","author":"brewer","year":"1999","journal-title":"Proceedings of the Section on Statistical Graphics"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1987.10488204"},{"key":"ref6","article-title":"Visual exploration of malicious network objects using semantic zoom, interactive encoding and dynamic queries","author":"conti","year":"2005","journal-title":"Proceedings of the IEEE Workshop on Visualization for Computer Security (VizSEC 2005)"},{"key":"ref5","first-page":"29","article-title":"Interactive visualization of serial periodic data","author":"cadis","year":"1998","journal-title":"UIST '98 Proceedings of the 11th annual ACM symposium on User interface software and technology"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2006.49"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2005.23"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/142750.143054"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2005.1532065"},{"key":"ref1","article-title":"Ids rainstorm: Visualizing ids alarms","author":"abdullah","year":"2005","journal-title":"Proceedings of the IEEE Workshop on Visualization for Computer Security (VizSEC 2005)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/IV.2002.1028831"},{"journal-title":"Information Visualization Perception for Design","year":"2000","author":"ware","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s001840000042"},{"key":"ref24","first-page":"43","article-title":"Animated exploration of dynamic graphs with radial layout","author":"yee","year":"2001","journal-title":"Proc IEEE Symp Information Visualization 2001"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/INFVIS.2001.963273"},{"key":"ref25","article-title":"Visflowconnect-ip: A link-based visualization of netflows for security monitoring","author":"yurcik","year":"2006","journal-title":"Proceedings of the Eighteenth Annual FIRST Conference on Computer Security Incident Handling"}],"event":{"name":"2007 IEEE Symposium on Visual Analytics Science and Technology","start":{"date-parts":[[2007,10,30]]},"location":"Sacramento, CA, USA","end":{"date-parts":[[2007,11,1]]}},"container-title":["2007 IEEE Symposium on Visual Analytics Science and Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4388976\/4388977\/04389007.pdf?arnumber=4389007","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T15:29:54Z","timestamp":1489678194000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4389007\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/vast.2007.4389007","relation":{},"subject":[],"published":{"date-parts":[[2007,10]]}}}