{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:28:28Z","timestamp":1750307308120,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,7,20]],"date-time":"2011-07-20T00:00:00Z","timestamp":1311120000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,7,20]]},"DOI":"10.1145\/2016904.2016905","type":"proceedings-article","created":{"date-parts":[[2011,8,10]],"date-time":"2011-08-10T16:16:32Z","timestamp":1312992992000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["TVi"],"prefix":"10.1145","author":[{"given":"Alberto","family":"Boschetti","sequence":"first","affiliation":[{"name":"University of Brescia NTW group Brescia, Italy"}]},{"given":"Luca","family":"Salgarelli","sequence":"additional","affiliation":[{"name":"University of Brescia NTW group Brescia, Italy"}]},{"given":"Chris","family":"Muelder","sequence":"additional","affiliation":[{"name":"University of California Davis VIDI Lab Davis, CA"}]},{"given":"Kwan-Liu","family":"Ma","sequence":"additional","affiliation":[{"name":"University of California Davis VIDI Lab Davis, CA"}]}],"member":"320","published-online":{"date-parts":[[2011,7,20]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Cisco netflow protocol. http:\/\/www.cisco.com\/web\/go\/netflow.  Cisco netflow protocol. http:\/\/www.cisco.com\/web\/go\/netflow."},{"key":"e_1_3_2_1_2_1","unstructured":"Color brewer 2.0 color advice for cartography. http:\/\/colorbrewer2.org\/.  Color brewer 2.0 color advice for cartography. http:\/\/colorbrewer2.org\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Darpa 1999 dataset. http:\/\/www.ll.mit.edu\/mission\/communications\/......\/ist\/corpora\/ideval\/data\/index.html.  Darpa 1999 dataset. http:\/\/www.ll.mit.edu\/mission\/communications\/......\/ist\/corpora\/ideval\/data\/index.html."},{"key":"e_1_3_2_1_4_1","unstructured":"Etherape a graphical network monitor. http:\/\/etherape.sourceforge.net.  Etherape a graphical network monitor. http:\/\/etherape.sourceforge.net."},{"key":"e_1_3_2_1_5_1","unstructured":"Hostip info ip addresses database. http:\/\/www.hostip.info\/dl\/index.html.  Hostip info ip addresses database. http:\/\/www.hostip.info\/dl\/index.html."},{"key":"e_1_3_2_1_6_1","unstructured":"Mysql cluster. http:\/\/www.mysql.com\/products\/cluster\/.  Mysql cluster. http:\/\/www.mysql.com\/products\/cluster\/."},{"key":"e_1_3_2_1_7_1","unstructured":"Ogdf c++ open graph drawing framework. http:\/\/www.ogdf.net.  Ogdf c++ open graph drawing framework. http:\/\/www.ogdf.net."},{"key":"e_1_3_2_1_8_1","unstructured":"Snort a free lightweight network intrusion detection system. http:\/\/www.snort.com.  Snort a free lightweight network intrusion detection system. http:\/\/www.snort.com."},{"key":"e_1_3_2_1_9_1","unstructured":"Tnv: The network visualizer. http:\/\/tnv.sourceforge.net\/.  Tnv: The network visualizer. http:\/\/tnv.sourceforge.net\/."},{"key":"e_1_3_2_1_10_1","unstructured":"TVi: the UniBS Trace Visualizer. http:\/\/www.ing.unibs.it\/ntw\/tools\/tvi.  TVi: the UniBS Trace Visualizer. http:\/\/www.ing.unibs.it\/ntw\/tools\/tvi."},{"key":"e_1_3_2_1_11_1","unstructured":"Wireshark packet analyzer. http:\/\/www.wireshark.org.  Wireshark packet analyzer. http:\/\/www.wireshark.org."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2009.4804318"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11555261_66"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2006.30"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIMSA.2010.5611752"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2009.5375536"},{"key":"e_1_3_2_1_17_1","first-page":"90","volume-title":"Graph Drawing'08","author":"Godiyal A.","year":"2008"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2009.5168026"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/11618058_22"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298349"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2008.151"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555349.1555356"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2009.090604"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080118"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029219"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/990680.990699"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00139-0"},{"key":"e_1_3_2_1_28_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"453","DOI":"10.1007\/3-540-44590-0_37","volume-title":"Theory and Application of Diagrams","author":"Makinen E.","year":"2000"},{"volume-title":"Addison-Wesley Professional","year":"2008","author":"Marty R.","key":"e_1_3_2_1_29_1"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382923"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029220"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1581114.1581119"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452539"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.02.001"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1254882.1254895"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.4544633"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2007.01.012"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/CATCH.2009.18"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2009.5375527"}],"event":{"name":"VizSec '11: 2011 International Symposium on Visualization for Cyber Security","acronym":"VizSec '11","location":"Pittsburgh Pennsylvania USA"},"container-title":["Proceedings of the 8th International Symposium on Visualization for Cyber Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2016904.2016905","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2016904.2016905","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:00:03Z","timestamp":1750244403000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2016904.2016905"}},"subtitle":["a visual querying system for network monitoring and anomaly detection"],"short-title":[],"issued":{"date-parts":[[2011,7,20]]},"references-count":39,"alternative-id":["10.1145\/2016904.2016905","10.1145\/2016904"],"URL":"https:\/\/doi.org\/10.1145\/2016904.2016905","relation":{},"subject":[],"published":{"date-parts":[[2011,7,20]]},"assertion":[{"value":"2011-07-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}