{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:43:33Z","timestamp":1750308213331,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,10,29]],"date-time":"2004-10-29T00:00:00Z","timestamp":1099008000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,10,29]]},"DOI":"10.1145\/1029208.1029232","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:58:48Z","timestamp":1107107928000},"page":"143-147","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":70,"title":["SnortView"],"prefix":"10.1145","author":[{"given":"Hideki","family":"Koike","sequence":"first","affiliation":[{"name":"University of Electro-Communications"}]},{"given":"Kazuhiro","family":"Ohno","sequence":"additional","affiliation":[{"name":"University of Electro-Communications"}]}],"member":"320","published-online":{"date-parts":[[2004,10,29]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Analysis Console for Intrusion Databases (ACID) http:\/\/www.andrew.cmu.edu\/~Erdanyliw\/snort\/snortacid.html  Analysis Console for Intrusion Databases (ACID) http:\/\/www.andrew.cmu.edu\/~Erdanyliw\/snort\/snortacid.html"},{"key":"e_1_3_2_1_2_1","volume-title":"Intrusion Detection","author":"Base Rebecca Gurley","year":"1999","unstructured":"Rebecca Gurley Base , Intrusion Detection , Macmillan Technical Publishing USA ( 1999 ). Rebecca Gurley Base, Intrusion Detection, Macmillan Technical Publishing USA (1999)."},{"key":"e_1_3_2_1_3_1","first-page":"244","volume-title":"Proceedings IEEE International Conference on Information Visualisation","author":"Erbacher Robert F.","year":"2002","unstructured":"Robert F. Erbacher , Deborah Frincke , Visualization in Detection of Intrusions and Misuse in Large Scale Networks , Proceedings IEEE International Conference on Information Visualisation , pp. 244 -- 249 ( 2002 ). Robert F. Erbacher, Deborah Frincke, Visualization in Detection of Intrusions and Misuse in Large Scale Networks, Proceedings IEEE International Conference on Information Visualisation, pp.244--249 (2002)."},{"key":"e_1_3_2_1_4_1","first-page":"12","volume-title":"Proceedings of 2001 DARPA Information Survivability Conference and Exposition (DISCEX 2001","author":"Hoagland James A.","year":"2001","unstructured":"James A. Hoagland , Stuart Staniford , Viewing IDS alerts : Lessons from SnortSnarf , Proceedings of 2001 DARPA Information Survivability Conference and Exposition (DISCEX 2001 ), pp. 12 - 14 ( 2001 ). James A. Hoagland, Stuart Staniford, Viewing IDS alerts: Lessons from SnortSnarf, Proceedings of 2001 DARPA Information Survivability Conference and Exposition (DISCEX 2001), pp.12-14 (2001)."},{"key":"e_1_3_2_1_5_1","unstructured":"RazorBack http:\/\/www.intersectalliance.com\/projects\/RazorBack\/  RazorBack http:\/\/www.intersectalliance.com\/projects\/RazorBack\/"},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. of the 1999 USENIX LISA conference","author":"Roesch M.","year":"1999","unstructured":"M. Roesch , Snort - Lightweight Intrusion Detection for Networks , Proc. of the 1999 USENIX LISA conference ( 1999 ). M. Roesch, Snort - Lightweight Intrusion Detection for Networks, Proc. of the 1999 USENIX LISA conference (1999)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/IV.2002.1028831"},{"key":"e_1_3_2_1_8_1","first-page":"133","volume-title":"Proc. of LISA XVI Sixteenth Systems Administration Conference, The USENIX Association","author":"Takada Tetsuji","year":"2002","unstructured":"Tetsuji Takada , Hideki Koike , Mielog : A Highly Interactive Visual Log Browser Using Information Visualization and Statistical Analysis , Proc. of LISA XVI Sixteenth Systems Administration Conference, The USENIX Association , pp. 133 -- 144 , 2002 . Tetsuji Takada, Hideki Koike, Mielog: A Highly Interactive Visual Log Browser Using Information Visualization and Statistical Analysis, Proc. of LISA XVI Sixteenth Systems Administration Conference, The USENIX Association, pp.133--144, 2002."}],"event":{"name":"CCS04: 11th ACM Conference on Computer and Communications Security 2004","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Washington DC USA","acronym":"CCS04"},"container-title":["Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1029208.1029232","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1029208.1029232","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:31:07Z","timestamp":1750264267000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1029208.1029232"}},"subtitle":["visualization system of snort logs"],"short-title":[],"issued":{"date-parts":[[2004,10,29]]},"references-count":8,"alternative-id":["10.1145\/1029208.1029232","10.1145\/1029208"],"URL":"https:\/\/doi.org\/10.1145\/1029208.1029232","relation":{},"subject":[],"published":{"date-parts":[[2004,10,29]]},"assertion":[{"value":"2004-10-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}