{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:39:08Z","timestamp":1759091948329,"version":"3.38.0"},"reference-count":43,"publisher":"SAGE Publications","issue":"1","license":[{"start":{"date-parts":[[2013,5,28]],"date-time":"2013-05-28T00:00:00Z","timestamp":1369699200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Information Visualization"],"published-print":{"date-parts":[[2015,1]]},"abstract":"<jats:p> In this article, we present a visual analytics system, SemanticPrism, which aims to analyze large-scale high-dimensional cyber security datasets containing logs of a million computers. SemanticPrism visualizes the data from three different perspectives: spatiotemporal distribution, overall temporal trends, and pixel-based IP (Internet Protocol) address blocks. With each perspective, we use semantic zooming to present more detailed information. The interlinked visualizations and multiple levels of detail allow us to detect unexpected changes taking place in different dimensions of the data and to identify potential anomalies in the network. After comparing our approach to other submissions, we outline potential paths for future improvement. <\/jats:p>","DOI":"10.1177\/1473871613488573","type":"journal-article","created":{"date-parts":[[2013,5,29]],"date-time":"2013-05-29T04:23:10Z","timestamp":1369801390000},"page":"62-75","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":9,"title":["Multi-aspect visual analytics on large-scale high-dimensional cyber security data"],"prefix":"10.1177","volume":"14","author":[{"given":"Victor Y","family":"Chen","sequence":"first","affiliation":[{"name":"Department of Computer Graphics Technology, Purdue University, West Lafayette, IN, USA"}]},{"given":"Ahmad M","family":"Razip","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Purdue University, West Lafayette, IN, USA"}]},{"given":"Sungahn","family":"Ko","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Purdue University, West Lafayette, IN, USA"}]},{"given":"Cheryl Z","family":"Qian","sequence":"additional","affiliation":[{"name":"Department of Art and Design, Purdue University, West Lafayette, IN, USA"}]},{"given":"David S","family":"Ebert","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Purdue University, West Lafayette, IN, USA"}]}],"member":"179","published-online":{"date-parts":[[2013,5,28]]},"reference":[{"key":"bibr1-1473871613488573","unstructured":"VAST. VAST challenge 2012: challenge descriptions. Available at: http:\/\/www.vacommunity.org\/tiki-index.php?page=VAST%20Challenge%202012%3A%20Challenge%20Descriptions."},{"first-page":"43","volume-title":"Proceedings of the conference on Visualization \u201999: celebrating ten years","author":"Fua Y-H","key":"bibr2-1473871613488573"},{"key":"bibr3-1473871613488573","doi-asserted-by":"publisher","DOI":"10.1109\/2945.841121"},{"key":"bibr4-1473871613488573","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8659.2011.01936.x"},{"first-page":"565","volume-title":"Proceedings of the Third IEEE International Conference on Data Mining","author":"Keim DA","key":"bibr5-1473871613488573"},{"key":"bibr6-1473871613488573","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2006.84"},{"key":"bibr7-1473871613488573","doi-asserted-by":"publisher","DOI":"10.1016\/B978-008044531-1\/50420-6"},{"first-page":"173","volume-title":"Proceedings of IEEE symposium on visual analytics science and technology","author":"Zhang L","key":"bibr8-1473871613488573"},{"first-page":"17","volume-title":"Proceedings of the 7th annual ACM symposium on User interface software and technology","author":"Bederson BB","key":"bibr9-1473871613488573"},{"first-page":"57","volume-title":"Proceedings of the 20th annual conference on computer graphics and interactive techniques","author":"Perlin K","key":"bibr10-1473871613488573"},{"first-page":"159","volume-title":"IEEE Symposium on Information Visualization (INFOVIS 2004)","author":"Weaver C","key":"bibr11-1473871613488573"},{"first-page":"83","volume-title":"Visualization for Computer Security, 2005.(VizSEC 05), IEEE Workshop on","author":"Conti G","key":"bibr12-1473871613488573"},{"key":"bibr13-1473871613488573","doi-asserted-by":"publisher","DOI":"10.1006\/jvlc.2001.0219"},{"key":"bibr14-1473871613488573","doi-asserted-by":"publisher","DOI":"10.1109\/2945.468391"},{"first-page":"1","volume-title":"Proceedings of the 8th International Symposium on Visualization for Cyber Security","author":"Boschetti A","key":"bibr15-1473871613488573"},{"first-page":"315","volume-title":"Proceedings of the 7th ACM SIGCOMM conference on Internet measurement","author":"Iliofotou M","key":"bibr16-1473871613488573"},{"key":"bibr17-1473871613488573","first-page":"149","volume":"42","author":"Eades P","year":"1984","journal-title":"Congr Numer"},{"first-page":"55","volume-title":"Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security","author":"Ball R","key":"bibr18-1473871613488573"},{"first-page":"26","volume-title":"Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security","author":"Yin X","key":"bibr19-1473871613488573"},{"first-page":"29","volume-title":"Visualization for Computer Security, 2005.(VizSEC 05). IEEE Workshop on","author":"Muelder C","key":"bibr20-1473871613488573"},{"first-page":"187","volume-title":"Visualization for Computer Security, 2007.(VizSEC 07). IEEE Workshop on","author":"Mansmann F","key":"bibr21-1473871613488573"},{"key":"bibr22-1473871613488573","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2010.150"},{"first-page":"287","volume-title":"Information Visualisation, 2008. IV\u201908. 12th International Conference","author":"Ziegler H","key":"bibr23-1473871613488573"},{"key":"bibr24-1473871613488573","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8659.2012.03117.x"},{"key":"bibr25-1473871613488573","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2006.198"},{"key":"bibr26-1473871613488573","doi-asserted-by":"publisher","DOI":"10.1559\/152304001782173970"},{"first-page":"222","volume-title":"Technologies for Homeland Security (HST), 2010 IEEE International Conference on","author":"Malik A","key":"bibr27-1473871613488573"},{"key":"bibr28-1473871613488573","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2011.10.002"},{"issue":"6","key":"bibr29-1473871613488573","first-page":"175","volume":"21","author":"Podnar H","year":"2006","journal-title":"J Comput Sci Coll"},{"volume-title":"Providing OLAP (On-Line Analytical Processing) to User Analysts: An IT Mandate","year":"1993","author":"Codd EF","key":"bibr30-1473871613488573"},{"key":"bibr31-1473871613488573","unstructured":"ADOBE. Adobe - Rich Internet applications. Available at: http:\/\/www.adobe.com\/resources\/business\/rich_internet_apps\/ (accessed 30 April 2013)."},{"key":"bibr32-1473871613488573","doi-asserted-by":"publisher","DOI":"10.1137\/1114019"},{"key":"bibr33-1473871613488573","volume-title":"The sciences of the artificial","author":"Simon HA","year":"1996","edition":"3"},{"key":"bibr34-1473871613488573","doi-asserted-by":"publisher","DOI":"10.3758\/BF03206794"},{"first-page":"336","volume-title":"Proceedings of IEEE symposium on visual languages","author":"Shneiderman B","key":"bibr35-1473871613488573"},{"first-page":"33","volume-title":"Pacific Visualization Symposium (PacificVis), 2010 IEEE","author":"Javed W","key":"bibr36-1473871613488573"},{"first-page":"165","volume-title":"Vast 2012 MC1 Award: \u201cSubject Matter Expert\u2019s Award","author":"Choudury S","key":"bibr37-1473871613488573"},{"first-page":"311","volume-title":"Proceedings of IEEE Conference on Visual Analytics Sciences and Technology","author":"Chen YV","key":"bibr38-1473871613488573"},{"volume-title":"Designing the user interface: strategies for effective human-computer interaction","year":"1986","author":"Shneiderman B","key":"bibr39-1473871613488573"},{"first-page":"167","volume-title":"IEEE Conference on Visual Analytics Science and Technology","author":"Dudas L","key":"bibr40-1473871613488573"},{"first-page":"169","volume-title":"IEEE conference on visual analytics science and technology","author":"Kachkaev A","key":"bibr41-1473871613488573"},{"first-page":"161","volume-title":"IEEE Conference on Visual Analytics Science and Technology","author":"Robert P","key":"bibr42-1473871613488573"},{"first-page":"151","volume-title":"IEEE Conference on Visual Analytics Science and Technology","author":"Cook KA","key":"bibr43-1473871613488573"}],"container-title":["Information Visualization"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1473871613488573","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1473871613488573","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1473871613488573","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,2]],"date-time":"2025-03-02T17:51:29Z","timestamp":1740937889000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/1473871613488573"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,28]]},"references-count":43,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,1]]}},"alternative-id":["10.1177\/1473871613488573"],"URL":"https:\/\/doi.org\/10.1177\/1473871613488573","relation":{},"ISSN":["1473-8716","1473-8724"],"issn-type":[{"type":"print","value":"1473-8716"},{"type":"electronic","value":"1473-8724"}],"subject":[],"published":{"date-parts":[[2013,5,28]]}}}