{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:09:48Z","timestamp":1750306188092,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,9,24]],"date-time":"2016-09-24T00:00:00Z","timestamp":1474675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,9,24]]},"DOI":"10.1145\/2968220.2968221","type":"proceedings-article","created":{"date-parts":[[2016,8,31]],"date-time":"2016-08-31T12:32:08Z","timestamp":1472646728000},"page":"25-29","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["IDSPlanet"],"prefix":"10.1145","author":[{"given":"Yang","family":"Shi","sequence":"first","affiliation":[{"name":"Central South University"}]},{"given":"Yaoxue","family":"Zhang","sequence":"additional","affiliation":[{"name":"Central South University"}]},{"given":"Fangfang","family":"Zhou","sequence":"additional","affiliation":[{"name":"Central South University"}]},{"given":"Ying","family":"Zhao","sequence":"additional","affiliation":[{"name":"Central South University"}]},{"given":"Guojun","family":"Wang","sequence":"additional","affiliation":[{"name":"Central South University"}]},{"given":"Ronghua","family":"Shi","sequence":"additional","affiliation":[{"name":"Central South University"}]},{"given":"Xing","family":"Liang","sequence":"additional","affiliation":[{"name":"Arizona State University"}]}],"member":"320","published-online":{"date-parts":[[2016,9,24]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Ids rainstorm: Visualizing ids alarms","author":"Abdullah K.","year":"2005","unstructured":"K. Abdullah , C. Lee , G. Conti , J. A. Copeland , and J. Stasko . Ids rainstorm: Visualizing ids alarms . 2005 . K. Abdullah, C. Lee, G. Conti, J. A. Copeland, and J. Stasko. Ids rainstorm: Visualizing ids alarms. 2005."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/VAST.2007.4389007"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2009.23"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2012.6375888"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2005.5"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.7763\/IJFCC.2012.V1.23"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/VAST.2006.261438"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029232"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2005.1495939"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2011.144"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1007\/978-3-642-17650-0_31","volume-title":"Information and Communications Security","author":"Shiravi H.","year":"2010","unstructured":"H. Shiravi , A. Shiravi , and A. A. Ghorbani . Ids alert visualization and monitoring through heuristic host selection . In Information and Communications Security , pages 445 -- 458 . Springer , 2010 . H. Shiravi, A. Shiravi, and A. A. Ghorbani. Ids alert visualization and monitoring through heuristic host selection. In Information and Communications Security, pages 445--458. Springer, 2010."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-013-4891-9"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03584-0_30"}],"event":{"name":"VINCI '16: The 9th International Symposium on Visual Information Communication and Interaction","acronym":"VINCI '16","location":"Dallas TX USA"},"container-title":["Proceedings of the 9th International Symposium on Visual Information Communication and Interaction"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2968220.2968221","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2968220.2968221","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:10Z","timestamp":1750218610000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2968220.2968221"}},"subtitle":["A Novel Radial Visualization of Intrusion Detection Alerts"],"short-title":[],"issued":{"date-parts":[[2016,9,24]]},"references-count":13,"alternative-id":["10.1145\/2968220.2968221","10.1145\/2968220"],"URL":"https:\/\/doi.org\/10.1145\/2968220.2968221","relation":{},"subject":[],"published":{"date-parts":[[2016,9,24]]},"assertion":[{"value":"2016-09-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}