{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:24:34Z","timestamp":1750307074591,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,15]],"date-time":"2012-10-15T00:00:00Z","timestamp":1350259200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,15]]},"DOI":"10.1145\/2379690.2379700","type":"proceedings-article","created":{"date-parts":[[2012,10,4]],"date-time":"2012-10-04T20:18:52Z","timestamp":1349381932000},"page":"72-79","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["DAEDALUS-VIZ"],"prefix":"10.1145","author":[{"given":"Daisuke","family":"Inoue","sequence":"first","affiliation":[{"name":"National Institute of Information and Communications Technology, Nukui-Kitamachi, Koganei, Tokyo, Japan"}]},{"given":"Masashi","family":"Eto","sequence":"additional","affiliation":[{"name":"National Institute of Information and Communications Technology, Nukui-Kitamachi, Koganei, Tokyo, Japan"}]},{"given":"Koei","family":"Suzuki","sequence":"additional","affiliation":[{"name":"National Institute of Information and Communications Technology, Nukui-Kitamachi, Koganei, Tokyo, Japan"}]},{"given":"Mio","family":"Suzuki","sequence":"additional","affiliation":[{"name":"National Institute of Information and Communications Technology, Nukui-Kitamachi, Koganei, Tokyo, Japan"}]},{"given":"Koji","family":"Nakao","sequence":"additional","affiliation":[{"name":"National Institute of Information and Communications Technology, Nukui-Kitamachi, Koganei, Tokyo, Japan"}]}],"member":"320","published-online":{"date-parts":[[2012,10,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/WISTDCS.2008.14"},{"key":"e_1_3_2_1_2_1","first-page":"5","volume":"92","author":"Nakao K.","year":"2009","journal-title":"Trans. Information and Systems"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04342-0_33"},{"key":"e_1_3_2_1_4_1","first-page":"1","author":"Goodall J.","year":"2007","journal-title":"Visualization for Computer Security. VizSEC"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2005.8"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2006.34"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029232"},{"key":"e_1_3_2_1_8_1","first-page":"92","volume-title":"S., A Visualization Paradigm for Network Intrusion Detection. 6th Ann. IEEE SMC Information Assurance Workshop","author":"Livnat Y.","year":"2005"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2006.30"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2016904.2016906"},{"key":"e_1_3_2_1_11_1","first-page":"42","volume-title":"Real-time and Forensic Network Data Analysis Using Animated and Coordinated Visualization. 6th Ann. IEEE SMC Information Assurance Workshop","author":"Krasser S.","year":"2005"},{"key":"e_1_3_2_1_12_1","first-page":"277","volume-title":"Intrusion Detection Visual Analyzer with Haptic Integration. 10th Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems","author":"Nyarko K.","year":"2002"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICICIC.2009.47"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029219"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/990680.990699"}],"event":{"name":"VizSec '12: 2012 Symposium on Visualization for Cyber Security","acronym":"VizSec '12","location":"Seattle Washington USA"},"container-title":["Proceedings of the Ninth International Symposium on Visualization for Cyber Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2379690.2379700","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2379690.2379700","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:33:57Z","timestamp":1750239237000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2379690.2379700"}},"subtitle":["novel real-time 3D visualization for darknet monitoring-based alert system"],"short-title":[],"issued":{"date-parts":[[2012,10,15]]},"references-count":15,"alternative-id":["10.1145\/2379690.2379700","10.1145\/2379690"],"URL":"https:\/\/doi.org\/10.1145\/2379690.2379700","relation":{},"subject":[],"published":{"date-parts":[[2012,10,15]]},"assertion":[{"value":"2012-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}