{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,16]],"date-time":"2026-05-16T18:21:35Z","timestamp":1778955695238,"version":"3.51.4"},"reference-count":41,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10,25]]},"DOI":"10.1109\/vizsec.2015.7312763","type":"proceedings-article","created":{"date-parts":[[2015,11,2]],"date-time":"2015-11-02T18:00:01Z","timestamp":1446487201000},"page":"1-8","source":"Crossref","is-referenced-by-count":27,"title":["Ocelot: user-centered design of a decision support visualization for network quarantine"],"prefix":"10.1109","author":[{"given":"Dustin L.","family":"Arendt","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Russ","family":"Burtner","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Daniel M.","family":"Best","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nathan D.","family":"Bos","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"John R.","family":"Gersh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Christine D.","family":"Piatko","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Celeste Lyn","family":"Paul","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref39","article-title":"VAST Challenge 2013: Situation Awareness and Prospective Analysis","author":"whiting","year":"2013","journal-title":"Visual Analytics Science and Technology 2013 IEEE Conference on"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1108\/09685221011035241","article-title":"Preparation, detection, and analysis: the diagnostic work of IT security incident response","volume":"18","author":"werlinger","year":"2010","journal-title":"Information Management & Computer Security"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.2000.0420"},{"key":"ref32","first-page":"733","article-title":"Network Visualization by Meaningful Substrates","volume":"12","author":"shneiderman","year":"2006","journal-title":"AVI06"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2011.144"},{"key":"ref30","first-page":"5","article-title":"SpringRain: An Ambient Information Display","author":"promann","year":"2013"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124851"},{"key":"ref35","article-title":"A solution to change security policies on-the-fly","volume":"183","author":"tomaz","year":"2006","journal-title":"CEUR Workshop Proceedings"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00219-9_2"},{"key":"ref10","first-page":"97","article-title":"Clockmap: Enhancing circular treemaps with temporal glyphs for time-series data","author":"fischer","year":"2012","journal-title":"In Proc EuroVis Short Papers Eurographics"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2002.1176279"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2609876.2609878"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1121949.1121984"},{"key":"ref13","article-title":"An Eye on Network Intruder-Administrator Shootouts","author":"girardin","year":"1999","journal-title":"Workshop on Intrusion Detection and Network Monitoring"},{"key":"ref14","first-page":"179","article-title":"The work of intrusion detection: rethinking the role of security analysts","author":"goodall","year":"2004","journal-title":"AMCIS 2004 Proceedings"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1031607.1031663"},{"key":"ref16","first-page":"1","article-title":"A Survey of Multi-faceted Graph Visualization","author":"hadlak","year":"2015","journal-title":"In Eurographics Conference on Visualization (EuroVis)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2663474.2663480"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/VISUAL.1991.175815"},{"key":"ref19","first-page":"18","article-title":"NetVis: A network security management visualization tool based on treemap","author":"kan","year":"2010","journal-title":"2010 2nd International Conference on Advanced Computer Control"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11379-1_20"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2012.45"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.137"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280693"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2005.1532072"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2663887.2663899"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2006.255087"},{"key":"ref8","first-page":"19","article-title":"The Real Work of Computer Network Defense Analysts","author":"damico","year":"2007","journal-title":"In IEEE Workshop on Visualization for Computer Security 2007 (VizSEC 07)"},{"key":"ref7","author":"dodge","year":"2001","journal-title":"Atlas of Cyberspace"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2671491.2671497"},{"key":"ref9","article-title":"Overlaying Graph Links on Treemaps","volume":"5","author":"fekete","year":"2003","journal-title":"IEEE Symposium on Information Visualization Conference Compendium"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029217"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2005.1532070"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/VAST.2010.5652910"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1117\/12.850646"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78243-8_13"},{"key":"ref41","first-page":"1","article-title":"VisFlowConnect-IP: a link-based visualization of Netflows for security monitoring","author":"yurcik","year":"2006","journal-title":"18th Annual FIRST Conference on Computer Security Incident Handling"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2005.1495939"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1177\/1071181312561063"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2007.70522"}],"event":{"name":"2015 IEEE Symposium on Visualization for Cyber Security (VizSec)","location":"Chicago, IL, USA","start":{"date-parts":[[2015,10,25]]},"end":{"date-parts":[[2015,10,25]]}},"container-title":["2015 IEEE Symposium on Visualization for Cyber Security (VizSec)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7310645\/7312757\/07312763.pdf?arnumber=7312763","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T18:43:54Z","timestamp":1498243434000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7312763\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,25]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/vizsec.2015.7312763","relation":{},"subject":[],"published":{"date-parts":[[2015,10,25]]}}}