{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T15:02:18Z","timestamp":1776092538424,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":93,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,8,25]],"date-time":"2020-08-25T00:00:00Z","timestamp":1598313600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"H2020","award":["833955"],"award-info":[{"award-number":["833955"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,8,25]]},"DOI":"10.1145\/3407023.3409228","type":"proceedings-article","created":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T14:05:43Z","timestamp":1704895543000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":51,"title":["Data visualization in internet of things"],"prefix":"10.1145","author":[{"given":"Antonis","family":"Protopsaltis","sequence":"first","affiliation":[{"name":"University of Western Macedonia, Kozani, Greece"}]},{"given":"Panagiotis","family":"Sarigiannidis","sequence":"additional","affiliation":[{"name":"University of Western Macedonia, Kozani, Greece"}]},{"given":"Dimitrios","family":"Margounakis","sequence":"additional","affiliation":[{"name":"Sidroco Holdings Ltd, Limassol, Cyprus"}]},{"given":"Anastasios","family":"Lytos","sequence":"additional","affiliation":[{"name":"Sidroco Holdings Ltd, Limassol, Cyprus"}]}],"member":"320","published-online":{"date-parts":[[2020,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1007\/978-3-540-70956-5_7","volume-title":"Visual Analytics: Definition, Process, and Challenges","author":"Keim D.","year":"2008","unstructured":"Keim , D. , Andrienko , G. , Fekete , J. , G\u00f6rg , C. , Kohlhammer , J. and Melan\u00e7on , G . ( 2008 ). Visual Analytics: Definition, Process, and Challenges . Lecture Notes in Computer Science , pp. 154 -- 175 . Keim, D., Andrienko, G., Fekete, J., G\u00f6rg, C., Kohlhammer, J. and Melan\u00e7on, G. (2008). Visual Analytics: Definition, Process, and Challenges. Lecture Notes in Computer Science, pp.154--175."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-013-1383-8"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/EESMS.2018.8405822"},{"key":"e_1_3_2_1_4_1","volume-title":"Mastering the Information Age-Solving Problems with Visual Analytics","author":"Keim D.","year":"2010","unstructured":"Keim , D. , Kohlhammer , J. , Ellis , G. , Mansmann , F. ( 2010 ) Mastering the Information Age-Solving Problems with Visual Analytics . Eurographics Association Keim, D., Kohlhammer, J., Ellis, G., Mansmann, F. (2010) Mastering the Information Age-Solving Problems with Visual Analytics. Eurographics Association"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-016-1663-1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2002.1021578"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2010.242"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2012.256"},{"key":"e_1_3_2_1_9_1","volume-title":"Visual analytics for the clustering capability of data. Science China Information Sciences, 56(5): 052110(14)","author":"Lu Z.","year":"2013","unstructured":"Lu Z. , Liu C. , Zhang Q. , Zhang C. , Fan D. , Yang P. ( 2013 ) Visual analytics for the clustering capability of data. Science China Information Sciences, 56(5): 052110(14) . Lu Z., Liu C., Zhang Q., Zhang C., Fan D., Yang P. (2013) Visual analytics for the clustering capability of data. Science China Information Sciences, 56(5): 052110(14)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.553159"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the Annual IEEE Conference on Information Visualization (INFOVIS). 97--104","author":"Wong P. C.","year":"2003","unstructured":"Wong P. C. , Foote H. , Adams D. , Cowley W. , Thomas J. ( 2003 ) Dynamic visualization of transient data streams . In Proceedings of the Annual IEEE Conference on Information Visualization (INFOVIS). 97--104 . Wong P. C., Foote H., Adams D., Cowley W., Thomas J. (2003) Dynamic visualization of transient data streams. In Proceedings of the Annual IEEE Conference on Information Visualization (INFOVIS). 97--104."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1206155"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13640-019-0443-6"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.3390\/atmos7030035"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.3390\/atmos8080148"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloudW.2017.101"},{"key":"e_1_3_2_1_17_1","volume-title":"Consistent individualized feature attribution for tree ensembles. arXiv preprint arXiv:1802.03888","author":"Lundberg S. M.","year":"2018","unstructured":"Lundberg , S. M. , Erion , G. G. , & Lee , S. I. ( 2018 ). Consistent individualized feature attribution for tree ensembles. arXiv preprint arXiv:1802.03888 . Lundberg, S. M., Erion, G. G., & Lee, S. I. (2018). Consistent individualized feature attribution for tree ensembles. arXiv preprint arXiv:1802.03888."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2017.3621228"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2007.70523"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOTEH.2018.8345544"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2011.2119499"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2015.11.050"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v3i1.13937"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCSE.2013.39"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2528895"},{"key":"e_1_3_2_1_26_1","volume-title":"Digital twins: The convergence of multimedia technologies","author":"El Saddik A.","year":"2018","unstructured":"El Saddik , A. ( 2018 ). Digital twins: The convergence of multimedia technologies . IEEE multimedia, 25(2), 87--92. El Saddik, A. (2018). Digital twins: The convergence of multimedia technologies. IEEE multimedia, 25(2), 87--92."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2968456.2974007"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2546307"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2016.7613201"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2018.2797638"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2008.25"},{"key":"e_1_3_2_1_32_1","volume-title":"Cyber-physical systems. The impact of control technology, 12(1), 161--166","author":"Baheti R.","year":"2011","unstructured":"Baheti , R. , & Gill , H. ( 2011 ). Cyber-physical systems. The impact of control technology, 12(1), 161--166 . Baheti, R., & Gill, H. (2011). Cyber-physical systems. The impact of control technology, 12(1), 161--166."},{"key":"e_1_3_2_1_33_1","volume-title":"Engineering IoT healthcare applications: towards a semantic data driven sustainable architecture. In eHealth 360\u00b0 (pp. 407--418)","author":"Zgheib R.","year":"2017","unstructured":"Zgheib , R. , Conchon , E. , & Bastide , R. ( 2017 ). Engineering IoT healthcare applications: towards a semantic data driven sustainable architecture. In eHealth 360\u00b0 (pp. 407--418) . Springer , Cham . Zgheib, R., Conchon, E., & Bastide, R. (2017). Engineering IoT healthcare applications: towards a semantic data driven sustainable architecture. In eHealth 360\u00b0 (pp. 407--418). Springer, Cham."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6525604"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SITIS.2015.121"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2727143"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2016.7844862"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2016.09.010"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIAS.2016.2600737"},{"key":"e_1_3_2_1_40_1","volume-title":"The internet of energy: smart sensor networks and big data management for smart grid","author":"Jaradat M.","year":"2015","unstructured":"Jaradat , M. , Jarrah , M. , Bousselham , A. , Jararweh , Y. , & Al-Ayyoub , M. ( 2015 ). The internet of energy: smart sensor networks and big data management for smart grid . Jaradat, M., Jarrah, M., Bousselham, A., Jararweh, Y., & Al-Ayyoub, M. (2015). The internet of energy: smart sensor networks and big data management for smart grid."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.3390\/en10040421"},{"key":"e_1_3_2_1_42_1","volume-title":"Big data visualization tools. arXiv preprint arXiv:1801.08336","author":"Bikakis N.","year":"2018","unstructured":"Bikakis , N. ( 2018 ). Big data visualization tools. arXiv preprint arXiv:1801.08336 . Bikakis, N. (2018). Big data visualization tools. arXiv preprint arXiv:1801.08336."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2602044.2602046"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataCongress.2015.91"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/WETICE.2016.31"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2016.2605581"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2016.2590302"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/WMNC.2016.7543976"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cag.2013.10.006"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2013.6583500"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2016.7536931"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2017.05.134"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2013.179"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2016.10.006"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJWGS.2015.067157"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2014.7004282"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/CONFLUENCE.2016.7508189"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2016.7732963"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3139241"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2018.00019"},{"key":"e_1_3_2_1_61_1","volume-title":"Targetvue: Visual analysis of anomalous user behaviors in online communication systems","author":"Cao N.","year":"2015","unstructured":"Cao , N. , Shi , C. , Lin , S. , Lu , J. , Lin , Y. R. , & Lin , C. Y. ( 2015 ). Targetvue: Visual analysis of anomalous user behaviors in online communication systems . IEEE transactions on visualization and computer graphics, 22(1), 280--289. Cao, N., Shi, C., Lin, S., Lu, J., Lin, Y. R., & Lin, C. Y. (2015). Targetvue: Visual analysis of anomalous user behaviors in online communication systems. IEEE transactions on visualization and computer graphics, 22(1), 280--289."},{"key":"e_1_3_2_1_62_1","volume-title":"ENTVis: A visual analytic tool for entropy-based network traffic anomaly detection","author":"Zhou F.","year":"2015","unstructured":"Zhou , F. , Huang , W. , Zhao , Y. , Shi , Y. , Liang , X. , & Fan , X. ( 2015 ). ENTVis: A visual analytic tool for entropy-based network traffic anomaly detection . IEEE computer graphics and applications, 35(6), 42--50. Zhou, F., Huang, W., Zhao, Y., Shi, Y., Liang, X., & Fan, X. (2015). ENTVis: A visual analytic tool for entropy-based network traffic anomaly detection. IEEE computer graphics and applications, 35(6), 42--50."},{"key":"e_1_3_2_1_63_1","volume-title":"Voila: Visual anomaly detection and monitoring with streaming spatiotemporal data","author":"Cao N.","year":"2017","unstructured":"Cao , N. , Lin , C. , Zhu , Q. , Lin , Y. R. , Teng , X. , & Wen , X. ( 2017 ). Voila: Visual anomaly detection and monitoring with streaming spatiotemporal data . IEEE transactions on visualization and computer graphics, 24(1), 23--33. Cao, N., Lin, C., Zhu, Q., Lin, Y. R., Teng, X., & Wen, X. (2017). Voila: Visual anomaly detection and monitoring with streaming spatiotemporal data. IEEE transactions on visualization and computer graphics, 24(1), 23--33."},{"key":"e_1_3_2_1_64_1","volume-title":"ViDX: Visual diagnostics of assembly line performance in smart factories","author":"Xu P.","year":"2016","unstructured":"Xu , P. , Mei , H. , Ren , L. , & Chen , W. ( 2016 ). ViDX: Visual diagnostics of assembly line performance in smart factories . IEEE transactions on visualization and computer graphics, 23(1), 291--300. Xu, P., Mei, H., Ren, L., & Chen, W. (2016). ViDX: Visual diagnostics of assembly line performance in smart factories. IEEE transactions on visualization and computer graphics, 23(1), 291--300."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/J.COMNET.2017.05.027"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-017-2281-6"},{"key":"e_1_3_2_1_67_1","volume-title":"Big Data in the construction industry: A review of present status, opportunities, and future trends. Advanced engineering informatics, 30(3), 500--521","author":"Bilal M.","year":"2016","unstructured":"Bilal , M. , Oyedele , L. O. , Qadir , J. , Munir , K. , Ajayi , S. O. , Akinade , O. O., . .. & Pasha , M. ( 2016 ). Big Data in the construction industry: A review of present status, opportunities, and future trends. Advanced engineering informatics, 30(3), 500--521 . Bilal, M., Oyedele, L. O., Qadir, J., Munir, K., Ajayi, S. O., Akinade, O. O., ... & Pasha, M. (2016). Big Data in the construction industry: A review of present status, opportunities, and future trends. Advanced engineering informatics, 30(3), 500--521."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64218-5_28"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/CBI.2018.10051"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2388958"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.01.027"},{"key":"e_1_3_2_1_73_1","volume-title":"A survey of outlier detection methodologies. Artificial intelligence review, 22(2), 85--126","author":"Hodge V.","year":"2004","unstructured":"Hodge , V. , & Austin , J. ( 2004 ). A survey of outlier detection methodologies. Artificial intelligence review, 22(2), 85--126 . Hodge, V., & Austin, J. (2004). A survey of outlier detection methodologies. Artificial intelligence review, 22(2), 85--126."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/VAST.2012.6400557"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/VAST.2010.5652467"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1111\/cgf.12904"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/PacificVis.2012.6183572"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1111\/cgf.13092"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2016.052"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2517076"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-014-0365-y"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2427994"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-stg.2018.0261"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2017.06.006"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2009.090604"},{"key":"e_1_3_2_1_86_1","volume-title":"Visualization of anomaly detection using prediction sensitivity. Sicherheit","author":"Laskov P.","year":"2005","unstructured":"Laskov , P. , Rieck , K. , Sch\u00e4fer , C. , & M\u00fcller , K. R. ( 2005 ). Visualization of anomaly detection using prediction sensitivity. Sicherheit 2005, Sicherheit-Schutz und Zuverl\u00e4ssigkeit . Laskov, P., Rieck, K., Sch\u00e4fer, C., & M\u00fcller, K. R. (2005). Visualization of anomaly detection using prediction sensitivity. Sicherheit 2005, Sicherheit-Schutz und Zuverl\u00e4ssigkeit."},{"key":"e_1_3_2_1_87_1","volume-title":"Visualizing and discovering non-trivial patterns in large time series databases. Information visualization, 4(2), 61--82","author":"Lin J.","year":"2005","unstructured":"Lin , J. , Keogh , E. , & Lonardi , S. ( 2005 ). Visualizing and discovering non-trivial patterns in large time series databases. Information visualization, 4(2), 61--82 . Lin, J., Keogh, E., & Lonardi, S. (2005). Visualizing and discovering non-trivial patterns in large time series databases. Information visualization, 4(2), 61--82."},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.4236\/sgre.2012.33025"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2018.01.010"},{"key":"e_1_3_2_1_90_1","volume-title":"Big data for internet of things: A survey. Future generation computer systems, 87, 601--614","author":"Ge M.","year":"2018","unstructured":"Ge , M. , Bangui , H. , & Buhnova , B. ( 2018 ). Big data for internet of things: A survey. Future generation computer systems, 87, 601--614 . Ge, M., Bangui, H., & Buhnova, B. (2018). Big data for internet of things: A survey. Future generation computer systems, 87, 601--614."},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/IC3I.2016.7918044"},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2689040"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.Congress.2013.60"}],"event":{"name":"ARES 2020: The 15th International Conference on Availability, Reliability and Security","location":"Virtual Event Ireland","acronym":"ARES 2020"},"container-title":["Proceedings of the 15th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3407023.3409228","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3407023.3409228","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:23Z","timestamp":1750200083000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3407023.3409228"}},"subtitle":["tools, methodologies, and challenges"],"short-title":[],"issued":{"date-parts":[[2020,8,25]]},"references-count":93,"alternative-id":["10.1145\/3407023.3409228","10.1145\/3407023"],"URL":"https:\/\/doi.org\/10.1145\/3407023.3409228","relation":{},"subject":[],"published":{"date-parts":[[2020,8,25]]},"assertion":[{"value":"2020-08-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}