{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T00:16:15Z","timestamp":1756167375341,"version":"3.44.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2012,12,1]],"date-time":"2012-12-01T00:00:00Z","timestamp":1354320000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2012,12,1]],"date-time":"2012-12-01T00:00:00Z","timestamp":1354320000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1109\/cybersecurity.2012.9","type":"proceedings-article","created":{"date-parts":[[2013,6,26]],"date-time":"2013-06-26T14:17:19Z","timestamp":1372256239000},"page":"16-23","source":"Crossref","is-referenced-by-count":2,"title":["Crucial Nodes Centric Visual Monitoring and Analysis of Computer Networks"],"prefix":"10.1109","author":[{"given":"Hanchen","family":"Song","sequence":"first","affiliation":[{"name":"Nat. Univ. of Defense Technol., Changsha, China"}]},{"given":"Chris W.","family":"Muelder","sequence":"additional","affiliation":[{"name":"Univ. of California, Davis, Davis, CA, USA"}]},{"given":"Kwan-Liu","family":"Ma","sequence":"additional","affiliation":[{"name":"Univ. of California, Davis, Davis, CA, USA"}]}],"member":"263","reference":[{"key":"19","first-page":"1","article-title":"Improving the performance of passive network monitoring applications with memory locality enhancements","volume":"34","author":"papadogiannakis","year":"2011","journal-title":"Computer Communications"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029220"},{"key":"18","article-title":"A visualization methodology for characterization of network scans","author":"muelder","year":"2004","journal-title":"IEEE Workshop on Visualization for Computer Security"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78243-8_13"},{"key":"16","first-page":"161","author":"marty","year":"2008","journal-title":"Applied Security Visualization"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2005.1495932"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2005.20"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/2016904.2016906"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76858-6_55"},{"key":"21","first-page":"133","article-title":"MieLog: A highly interactive visual log browser using information visualization and statistical analysis","author":"takada","year":"2002","journal-title":"proceedings of Conference on system administration"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2011.144"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00219-9_2"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.05.029"},{"journal-title":"Ieee Vast Challenge","year":"2011","key":"24"},{"journal-title":"Ieee Vast Challenge 2011data Set","year":"0","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2011.5772054"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2009.5375527"},{"key":"3","doi-asserted-by":"crossref","DOI":"10.1145\/2016904.2016905","article-title":"TVi: A visual querying system for network monitoring and anomaly detection","author":"boschetti","year":"2011","journal-title":"International Symposium on Visualization for Cyber Security"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2008.12.005"},{"journal-title":"A Survey Taxonomy and Analysis of Network Security Visualization","year":"2006","author":"kasemsri","key":"10"},{"key":"1","first-page":"59","article-title":"Visualizing intrusions: Watching the web server","author":"axelsson","year":"2004","journal-title":"International Conference on Information Security"},{"key":"7","first-page":"720","article-title":"Multi-node monitoring and intrusion detection","author":"erbacher","year":"2002","journal-title":"International Conference on Visualization Imaging and Image Processing"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2010.209"},{"key":"5","article-title":"Designing visualization capablities for IDS challenges","author":"christensen","year":"2005","journal-title":"6th International Workshop on Visualization for Cyber Security"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879168"},{"key":"9","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/IV.2003.1217950","article-title":"Using curves to enhance parallel coordinate visualisations","author":"graham","year":"2003","journal-title":"Information Visualization 2003 IV 2003 Proceedings Seventh International Conference on"},{"key":"8","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/978-3-540-85933-8_11","article-title":"Large-scale network monitoring for visual analysis of attacks","author":"fischer","year":"2008","journal-title":"Proc of the 5th International Workshop on Visualization for Computer Security"}],"event":{"name":"2012 International Conference on Cyber Security (CyberSecurity)","start":{"date-parts":[[2012,12,14]]},"location":"Alexandria, VA, USA","end":{"date-parts":[[2012,12,16]]}},"container-title":["2012 International Conference on Cyber Security"],"original-title":[],"link":[{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx7\/6542298\/6542512\/06542521.pdf?arnumber=6542521","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,25]],"date-time":"2025-08-25T20:20:37Z","timestamp":1756153237000},"score":1,"resource":{"primary":{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/ieeexplore.ieee.org\/document\/6542521\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12]]},"references-count":27,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1109\/cybersecurity.2012.9","relation":{},"subject":[],"published":{"date-parts":[[2012,12]]}}}