{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:53:44Z","timestamp":1750308824058,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,9,14]],"date-time":"2010-09-14T00:00:00Z","timestamp":1284422400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,9,14]]},"DOI":"10.1145\/1850795.1850797","type":"proceedings-article","created":{"date-parts":[[2010,9,2]],"date-time":"2010-09-02T13:14:34Z","timestamp":1283433274000},"page":"13-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Proposing a multi-touch interface for intrusion detection environments"],"prefix":"10.1145","author":[{"given":"Jeffrey","family":"Guenther","sequence":"first","affiliation":[{"name":"Simon Fraser University, Surrey, BC, Canada"}]},{"given":"Fred","family":"Volk","sequence":"additional","affiliation":[{"name":"Liberty University, Lynchburg, VA"}]},{"given":"Mark","family":"Shaneck","sequence":"additional","affiliation":[{"name":"Liberty University, Lynchburg, VA"}]}],"member":"320","published-online":{"date-parts":[[2010,9,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Microsoft surface. http:\/\/www.microsoft.com\/surface\/.  Microsoft surface. http:\/\/www.microsoft.com\/surface\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Multitouch. http:\/\/multitouch.fi\/.  Multitouch. http:\/\/multitouch.fi\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Perceptive pixel. http:\/\/www.perceptivepixel.com\/.  Perceptive pixel. http:\/\/www.perceptivepixel.com\/."},{"key":"e_1_3_2_1_4_1","volume-title":"Morgan Kaufmann","author":"Buxton B.","year":"2007","unstructured":"B. Buxton . Sketching user experiences: getting the design right and the right design . Morgan Kaufmann , 2007 . B. Buxton. Sketching user experiences: getting the design right and the right design. Morgan Kaufmann, 2007."},{"key":"e_1_3_2_1_5_1","unstructured":"B. Buxton. Multi-touch systems that i have known and loved. http:\/\/www.billbuxton.com\/multitouchOverview.html 2009.  B. Buxton. Multi-touch systems that i have known and loved. http:\/\/www.billbuxton.com\/multitouchOverview.html 2009."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2003.1194892"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/829514.830542"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 2001 IEEE Workshop on Data Mining for Security Application","author":"Dain O.","year":"2001","unstructured":"O. Dain and R. Cunningham . Fusing a Heterogenous Alert Stream Into Scenarios . In Proceedings of the 2001 IEEE Workshop on Data Mining for Security Application , 2001 . O. Dain and R. Cunningham. Fusing a Heterogenous Alert Stream Into Scenarios. In Proceedings of the 2001 IEEE Workshop on Data Mining for Security Application, 2001."},{"key":"e_1_3_2_1_9_1","article-title":"Building Scenarios from a Heterogeneous Alert Stream. In","author":"Dain O.","year":"2002","unstructured":"O. Dain and R. Cunningham . Building Scenarios from a Heterogeneous Alert Stream. In IEEE Transactions on Systems, Man and Cybernetics , 2002 . O. Dain and R. Cunningham. Building Scenarios from a Heterogeneous Alert Stream. In IEEE Transactions on Systems, Man and Cybernetics, 2002.","journal-title":"IEEE Transactions on Systems, Man and Cybernetics"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78243-8_2"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/645839.670735"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02627-0_12"},{"key":"e_1_3_2_1_13_1","first-page":"228","volume-title":"Glyph-based generic network visualization","author":"Erbacher R. F.","year":"2002","unstructured":"R. F. Erbacher . Glyph-based generic network visualization . volume 4665 , pages 228 -- 237 . SPIE , 2002 . R. F. Erbacher. Glyph-based generic network visualization. volume 4665, pages 228--237. SPIE, 2002."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/38.974517"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the SPIE Annual Symposium on AeroSense, Battlespace Digitization and Network Centric Systems III","author":"Ertoz L.","year":"2003","unstructured":"L. Ertoz , A. Lazarevic , E. Eilertson , P.-N. Tan , P. Dokas , V. Kumar , and J. Srivastava . Protecting against cyber threats in networked information systems . In Proceedings of the SPIE Annual Symposium on AeroSense, Battlespace Digitization and Network Centric Systems III , 2003 . L. Ertoz, A. Lazarevic, E. Eilertson, P.-N. Tan, P. Dokas, V. Kumar, and J. Srivastava. Protecting against cyber threats in networked information systems. In Proceedings of the SPIE Annual Symposium on AeroSense, Battlespace Digitization and Network Centric Systems III, 2003."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85933-8_11"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1688291.1688332"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 122nd Convention of the Audio Engineering Society","author":"Garc\u00eda-Ruiz M. A.","year":"2007","unstructured":"M. A. Garc\u00eda-Ruiz , M. A. Martin , and B. Kapralos . Towards multimodal interfaces for intrusion detection . In Proceedings of the 122nd Convention of the Audio Engineering Society , 2007 . M. A. Garc\u00eda-Ruiz, M. A. Martin, and B. Kapralos. Towards multimodal interfaces for intrusion detection. In Proceedings of the 122nd Convention of the Audio Engineering Society, 2007."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1108\/09593840910962195"},{"key":"e_1_3_2_1_21_1","volume-title":"Tenth Americas Conference on Information Systems","author":"Goodall J. R.","year":"2004","unstructured":"J. R. Goodall , W. G. Lutters , and A. Komlodi . The real work of intrusion detection: Rethinking the role of security analysts . In Tenth Americas Conference on Information Systems , New York, New York , August 2004 , 2004. J. R. Goodall, W. G. Lutters, and A. Komlodi. The real work of intrusion detection: Rethinking the role of security analysts. In Tenth Americas Conference on Information Systems, New York, New York, August 2004, 2004."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1108\/09593840910962186"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1056808.1056927"},{"key":"e_1_3_2_1_24_1","volume-title":"search of sensitive ethnography of change: Tracing the invisible handoffs from technology developers to users. Mind, Culture, and Activity, 12(2):90--112","author":"Hasu M.","year":"2005","unstructured":"M. Hasu . In search of sensitive ethnography of change: Tracing the invisible handoffs from technology developers to users. Mind, Culture, and Activity, 12(2):90--112 , 2005 . M. Hasu. In search of sensitive ethnography of change: Tracing the invisible handoffs from technology developers to users. Mind, Culture, and Activity, 12(2):90--112, 2005."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2006.34"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301325"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/VAST.2009.5333020"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1555880.1555910"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029232"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/985921.1062935"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/223826.223828"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2005.1495939"},{"key":"e_1_3_2_1_33_1","first-page":"81","volume-title":"VIS '99: Proceedings of the conference on Visualization '99","author":"Ma K.-L.","year":"1999","unstructured":"K.-L. Ma . Image graphs---a novel approach to visual data exploration . In VIS '99: Proceedings of the conference on Visualization '99 , pages 81 -- 88 , Los Alamitos, CA, USA , 1999 . IEEE Computer Society Press. K.-L. Ma. Image graphs---a novel approach to visual data exploration. In VIS '99: Proceedings of the conference on Visualization '99, pages 81--88, Los Alamitos, CA, USA, 1999. IEEE Computer Society Press."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1641587.1641590"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85933-8_14"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/11663812_14"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/1754701.1754709"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586144"},{"key":"e_1_3_2_1_39_1","volume-title":"Correlating Alerts Using Prerequisites of Intrusions. Technical report","author":"Ning P.","year":"2001","unstructured":"P. Ning , D. Reeves , and Y. Cui . Correlating Alerts Using Prerequisites of Intrusions. Technical report , North Carolina State University , Department of Computer Science, 2001 . P. Ning, D. Reeves, and Y. Cui. Correlating Alerts Using Prerequisites of Intrusions. Technical report, North Carolina State University, Department of Computer Science, 2001."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948137"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1042031.1042036"},{"key":"e_1_3_2_1_42_1","volume-title":"Network and Distributed System Security Symposium","author":"Ning P.","year":"2004","unstructured":"P. Ning , D. Xu , C. Healey , and R. S. Amant . Building Attack Scenarios through Integration of Complementary Alert Correlation Methods . In Network and Distributed System Security Symposium , 2004 . P. Ning, D. Xu, C. Healey, and R. S. Amant. Building Attack Scenarios through Integration of Complementary Alert Correlation Methods. In Network and Distributed System Security Symposium, 2004."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03658-3_31"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/795682.797522"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/1754701.1754710"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2006.36"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1518\/001872008X288556"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TABLETOP.2006.12"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.5555\/829514.830526"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323688.1323689"},{"key":"e_1_3_2_1_51_1","unstructured":"Snort - The Open Source Network Intrusion Detection System. http:\/\/www.snort.org.  Snort - The Open Source Network Intrusion Detection System. http:\/\/www.snort.org."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/CATCH.2009.18"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.5555\/645839.670734"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.21"},{"issue":"4","key":"e_1_3_2_1_55_1","first-page":"273","article-title":"The cognitive task analysis methods for job and task design: review and reappraisal. Behaviour &amp;","volume":"23","author":"Wei J.","year":"2004","unstructured":"J. Wei and G. Salvendy . The cognitive task analysis methods for job and task design: review and reappraisal. Behaviour &amp; Information Technology , 23 ( 4 ): 273 -- 299 , 2004 . J. Wei and G. Salvendy. The cognitive task analysis methods for job and task design: review and reappraisal. Behaviour &amp; Information Technology, 23(4):273--299, 2004.","journal-title":"Information Technology"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518866"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1080\/14639220110037452"},{"key":"e_1_3_2_1_58_1","volume-title":"Proceedings of the 19th Annual Computer Security Applications Conference","author":"Wu Y.","year":"2003","unstructured":"Y. Wu , B. Foo , Y. Mei , and S. Bagchi . Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS . In Proceedings of the 19th Annual Computer Security Applications Conference , 2003 . Y. Wu, B. Foo, Y. Mei, and S. Bagchi. Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS. In Proceedings of the 19th Annual Computer Security Applications Conference, 2003."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.5"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.29"}],"event":{"name":"VizSec '10: 7th International Symposium on Visualization for Cyber Security","acronym":"VizSec '10","location":"Ottawa Ontario Canada"},"container-title":["Proceedings of the Seventh International Symposium on Visualization for Cyber Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1850795.1850797","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1850795.1850797","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:26:50Z","timestamp":1750278410000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1850795.1850797"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9,14]]},"references-count":59,"alternative-id":["10.1145\/1850795.1850797","10.1145\/1850795"],"URL":"https:\/\/doi.org\/10.1145\/1850795.1850797","relation":{},"subject":[],"published":{"date-parts":[[2010,9,14]]},"assertion":[{"value":"2010-09-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}