{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:43:33Z","timestamp":1750308213880,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,10,29]],"date-time":"2004-10-29T00:00:00Z","timestamp":1099008000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,10,29]]},"DOI":"10.1145\/1029208.1029223","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:58:48Z","timestamp":1107107928000},"page":"90-98","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["CyberSeer"],"prefix":"10.1145","author":[{"given":"Christos","family":"Papadopoulos","sequence":"first","affiliation":[{"name":"University of Southern California"}]},{"given":"Chris","family":"Kyriakakis","sequence":"additional","affiliation":[{"name":"University of Southern California"}]},{"given":"Alexander","family":"Sawchuk","sequence":"additional","affiliation":[{"name":"University of Southern California"}]},{"given":"Xinming","family":"He","sequence":"additional","affiliation":[{"name":"University of Southern California"}]}],"member":"320","published-online":{"date-parts":[[2004,10,29]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"http:\/\/www.tcpdump.org\/  http:\/\/www.tcpdump.org\/"},{"key":"e_1_3_2_1_2_1","unstructured":"http:\/\/www.tcptrace.org\/  http:\/\/www.tcptrace.org\/"},{"key":"e_1_3_2_1_3_1","unstructured":"http:\/\/www.snort.org\/  http:\/\/www.snort.org\/"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863968"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/781027.781077"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"A. Broido R. King E. Nemeth and K.C. Claffy \"Radon Spectroscopy of Inter-Packet Delay \" High Speed Networking (HSN) 2003 Workshop 2003.  A. Broido R. King E. Nemeth and K.C. Claffy \"Radon Spectroscopy of Inter-Packet Delay \" High Speed Networking (HSN) 2003 Workshop 2003.","DOI":"10.1016\/S1388-3437(03)80187-7"},{"key":"e_1_3_2_1_7_1","unstructured":"http:\/\/dast.nlanr.net\/Projects\/Iperf\/  http:\/\/dast.nlanr.net\/Projects\/Iperf\/"},{"volume-title":"Auditory Display","year":"1994","author":"Kramer G.","key":"e_1_3_2_1_8_1"},{"volume-title":"New York: Dover","year":"1961","author":"Mowbry G.H.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.3758\/BF03211521"},{"volume-title":"Auditory Display","year":"1994","author":"Williams S.M.","key":"e_1_3_2_1_11_1"},{"volume-title":"Proceedings of the International Computer Music Conference (ICMA), 214--221, San Francisco, CA 1991.","author":"Kramer G.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","first-page":"1405","volume-title":"IEEE Proc. Int. Conf. Spoken Language Processing (ICSLP)","author":"Baudoin G.","year":"1996"},{"journal-title":"IEEE Trans. Speech and Audio Processing.","article-title":"Multichannel Audio Synthesis by Subband-Based Spectral Conversion and Parameter Adaptation, accepted for publication","author":"Mouchtaris A.","key":"e_1_3_2_1_14_1"},{"issue":"4","key":"e_1_3_2_1_15_1","article-title":"High Fidelity Multichannel Audio Coding with Karhunen-Loeve Transform","volume":"11","author":"Yang D.","year":"2003","journal-title":"IEEE Trans. on Speech and Audio Processing"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1155\/S1110865703304044"},{"key":"e_1_3_2_1_17_1","unstructured":"A.S. Bregman \"Auditory Scene Analysis\" MIT Press Cambridge MA 1983.  A.S. Bregman \"Auditory Scene Analysis\" MIT Press Cambridge MA 1983."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1121\/1.395906"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/6046.845012"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1155\/S1110865703304032"},{"key":"e_1_3_2_1_21_1","first-page":"196","article-title":"Localization of Lateral Phantom Sources","volume":"25","author":"Theile G.","year":"1977","journal-title":"Journal of the Audio Engineering Society"},{"key":"e_1_3_2_1_22_1","unstructured":"J. Blauert \"Spatial Hearing: The Psychophysics of Human Sound Localization\". MIT Press Cambridge MA. 1983.  J. Blauert \"Spatial Hearing: The Psychophysics of Human Sound Localization\". MIT Press Cambridge MA. 1983."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Y. Ando Concert Hall Acoustics Springer-Verlag New York 1985.  Y. Ando Concert Hall Acoustics Springer-Verlag New York 1985.","DOI":"10.1007\/978-3-642-69810-1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.3758\/BF03203075"},{"volume-title":"Scientific American Library","year":"2000","author":"Friedhoff R.M.","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","unstructured":"D. Marr. Vision W.H. Freeman and Co. 1982.  D. Marr. Vision W.H. Freeman and Co. 1982."},{"key":"e_1_3_2_1_27_1","unstructured":"P. Varner Security Sonification and Visualization: A State-of-the-Art Report http:\/\/dependability.cs.virginia.edu\/bibliography\/state-of-the-art.pdf.  P. Varner Security Sonification and Visualization: A State-of-the-Art Report http:\/\/dependability.cs.virginia.edu\/bibliography\/state-of-the-art.pdf."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/2945.468391"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.2104"},{"key":"e_1_3_2_1_30_1","first-page":"457","article-title":"Visualizing large-scale telecommunication networks and services","volume":"97","author":"Koutsofios E.E.","journal-title":"Proceedings of the IEEE Visualization"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/245882.245901"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.881696"},{"key":"e_1_3_2_1_33_1","first-page":"511","article-title":"Workshop on information exploration shootout project and benchmark data sets: Evaluating how visualization does in analyzing real world data analysis problems","volume":"97","author":"Grinstein G.","year":"1997","journal-title":"Proc. of the IEEE Visualization"},{"key":"e_1_3_2_1_34_1","volume-title":"Stereoscopic Displays and Virtual Reality Systems XI Symposium, Proc. SPIE","volume":"5291","author":"Alpaslan Z.Y.","year":"2004"}],"event":{"name":"CCS04: 11th ACM Conference on Computer and Communications Security 2004","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Washington DC USA","acronym":"CCS04"},"container-title":["Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1029208.1029223","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1029208.1029223","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:31:07Z","timestamp":1750264267000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1029208.1029223"}},"subtitle":["3D audio-visual immersion for network security and management"],"short-title":[],"issued":{"date-parts":[[2004,10,29]]},"references-count":34,"alternative-id":["10.1145\/1029208.1029223","10.1145\/1029208"],"URL":"https:\/\/doi.org\/10.1145\/1029208.1029223","relation":{},"subject":[],"published":{"date-parts":[[2004,10,29]]},"assertion":[{"value":"2004-10-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}