{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T05:27:04Z","timestamp":1767677224808,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,10,29]],"date-time":"2004-10-29T00:00:00Z","timestamp":1099008000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,10,29]]},"DOI":"10.1145\/1029208.1029217","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:58:48Z","timestamp":1107107928000},"page":"55-64","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":93,"title":["Home-centric visualization of network traffic for security administration"],"prefix":"10.1145","author":[{"given":"Robert","family":"Ball","sequence":"first","affiliation":[{"name":"Virginia Polytechnic Institute and State University"}]},{"given":"Glenn A.","family":"Fink","sequence":"additional","affiliation":[{"name":"Virginia Polytechnic Institute and State University"}]},{"given":"Chris","family":"North","sequence":"additional","affiliation":[{"name":"Virginia Polytechnic Institute and State University"}]}],"member":"320","published-online":{"date-parts":[[2004,10,29]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1","volume-title":"Proceedings of the 2000 USENIX Annual Technical Conference","author":"Cheswick B.","year":"2000","unstructured":"B. Cheswick , H. Burch , and S. Branigan . Mapping and visualizing the internet . In Proceedings of the 2000 USENIX Annual Technical Conference , pages 1 -- 12 . USENIX Assoc. , 2000 . B. Cheswick, H. Burch, and S. Branigan. Mapping and visualizing the internet. In Proceedings of the 2000 USENIX Annual Technical Conference, pages 1--12. USENIX Assoc., 2000."},{"key":"e_1_3_2_1_2_1","volume-title":"July","author":"Cota J. T.","year":"2001","unstructured":"J. T. Cota . Implementacion de un monitor y analizador grafico de red en el entorno gnome , July 2001 . J. T. Cota. Implementacion de un monitor y analizador grafico de red en el entorno gnome, July 2001."},{"key":"e_1_3_2_1_3_1","first-page":"2507","volume-title":"Proceedings of IEEE International Conference on Systems, Man and Cybernetics","author":"Erbacher R. F.","year":"2003","unstructured":"R. F. Erbacher . Intrusion behavior detection through visualization . In Proceedings of IEEE International Conference on Systems, Man and Cybernetics , pages 2507 -- 2513 . IEEE, IEEE Computer Society , 2003 . R. F. Erbacher. Intrusion behavior detection through visualization. In Proceedings of IEEE International Conference on Systems, Man and Cybernetics, pages 2507--2513. IEEE, IEEE Computer Society, 2003."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863972"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/353323.353324"},{"key":"e_1_3_2_1_6_1","first-page":"361","volume-title":"Proc. 21st NIST-NCSC National Information Systems Security Conference","author":"Frincke D. A.","year":"1998","unstructured":"D. A. Frincke , D. Tobin , J. C. McConnell , J. Marconi , and D. Polla . A framework for cooperative intrusion detection . In Proc. 21st NIST-NCSC National Information Systems Security Conference , pages 361 -- 373 . NIST, 1998 . D. A. Frincke, D. Tobin, J. C. McConnell, J. Marconi, and D. Polla. A framework for cooperative intrusion detection. In Proc. 21st NIST-NCSC National Information Systems Security Conference, pages 361--373. NIST, 1998."},{"key":"e_1_3_2_1_7_1","first-page":"1","volume-title":"Proceedings of the 1st USENIX Workshop on Intrusion Detection and Network Monitoring","author":"Girardin L.","year":"1999","unstructured":"L. Girardin . An eye on network intruder-administrator shootouts . In Proceedings of the 1st USENIX Workshop on Intrusion Detection and Network Monitoring , pages 1 -- 12 . USENIX Assoc. , 1999 . L. Girardin. An eye on network intruder-administrator shootouts. In Proceedings of the 1st USENIX Workshop on Intrusion Detection and Network Monitoring, pages 1--12. USENIX Assoc., 1999."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/2945.841119"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/2945.841121"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/288216.288245"},{"key":"e_1_3_2_1_11_1","first-page":"147","volume-title":"Proceedings of the IEEE Symposium on Information Visualization 2003","author":"Li Q.","year":"2003","unstructured":"Q. Li and C. North . Empirical comparison of dynamic query sliders and brushing histograms . In Proceedings of the IEEE Symposium on Information Visualization 2003 , pages 147 -- 153 . IEEE Computer Society , 2003 . Q. Li and C. North. Empirical comparison of dynamic query sliders and brushing histograms. In Proceedings of the IEEE Symposium on Information Visualization 2003, pages 147--153. IEEE Computer Society, 2003."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00139-0"},{"key":"e_1_3_2_1_13_1","unstructured":"D. McGuire. Study: Online crime costs rising http:\/\/www.washingtonpost.com\/wpdyn\/articles\/a53042-52004may53024.html 2004.  D. McGuire. Study: Online crime costs rising http:\/\/www.washingtonpost.com\/wpdyn\/articles\/a53042-52004may53024.html 2004."},{"key":"e_1_3_2_1_14_1","first-page":"8","volume-title":"LBHT Proc. IEEE Symposium on InfoVis 2001","author":"North C.","year":"2001","unstructured":"C. North , U. Farooq , and D. Akhter . Datawear: Revealing trends of dynamic data in visualizations . In LBHT Proc. IEEE Symposium on InfoVis 2001 , pages 8 -- 11 . IEEE, IEEE computer Society , October 2001 . C. North, U. Farooq, and D. Akhter. Datawear: Revealing trends of dynamic data in visualizations. In LBHT Proc. IEEE Symposium on InfoVis 2001, pages 8--11. IEEE, IEEE computer Society, October 2001."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/580582.857721"},{"key":"e_1_3_2_1_16_1","first-page":"277","volume-title":"Proceedings of the 15th annual ACM symposium on User interface software and technology","author":"Nyarko K.","year":"2002","unstructured":"K. Nyarko , T. Capers , C. Scott , and K. Ladeji-Osias . Network intrusion visualization with niva, an instrusion detection visual analyzer with haptic integration . In Proceedings of the 15th annual ACM symposium on User interface software and technology , pages 277 -- 284 . IEEE, Palgrave Macmillan , March 2002 . K. Nyarko, T. Capers, C. Scott, and K. Ladeji-Osias. Network intrusion visualization with niva, an instrusion detection visual analyzer with haptic integration. In Proceedings of the 15th annual ACM symposium on User interface software and technology, pages 277--284. IEEE, Palgrave Macmillan, March 2002."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/288392.288596"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/832277.834354"},{"key":"e_1_3_2_1_19_1","unstructured":"Tcpdump public repository June 2004.  Tcpdump public repository June 2004."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/VISUAL.2003.1250415"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/0016-7185(92)90011-R"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(03)00406-1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1177\/001872088302500209"}],"event":{"name":"CCS04: 11th ACM Conference on Computer and Communications Security 2004","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Washington DC USA","acronym":"CCS04"},"container-title":["Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1029208.1029217","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1029208.1029217","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:31:07Z","timestamp":1750264267000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1029208.1029217"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,10,29]]},"references-count":23,"alternative-id":["10.1145\/1029208.1029217","10.1145\/1029208"],"URL":"https:\/\/doi.org\/10.1145\/1029208.1029217","relation":{},"subject":[],"published":{"date-parts":[[2004,10,29]]},"assertion":[{"value":"2004-10-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}