Designing the user interface (2nd ed.): strategies for effective human-computer interaction
Designing the user interface (2nd ed.): strategies for effective human-computer interaction
From data mining to knowledge discovery: an overview
Advances in knowledge discovery and data mining
IEEE/ACM Transactions on Networking (TON)
Towards an effective cooperation of the user and the computer for classification
Proceedings of the sixth ACM SIGKDD international conference on Knowledge discovery and data mining
Case study: interactive visualization for internet security
Proceedings of the conference on Visualization '02
Graph Visualization and Navigation in Information Visualization: A Survey
IEEE Transactions on Visualization and Computer Graphics
Exploring Large Graphs in 3D Hyperbolic Space
IEEE Computer Graphics and Applications
An Eye on Network Intruder-Administrator Shootouts
Proceedings of the Workshop on Intrusion Detection and Network Monitoring
Considering Both Intra-Pattern and Inter-Pattern Anomalies for Intrusion Detection
ICDM '02 Proceedings of the 2002 IEEE International Conference on Data Mining
Visualizing the global topology of the MBone
INFOVIS '96 Proceedings of the 1996 IEEE Symposium on Information Visualization (INFOVIS '96)
Data Mining Methods for Detection of New Malicious Executables
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Parallel coordinates: a tool for visualizing multi-dimensional geometry
VIS '90 Proceedings of the 1st conference on Visualization '90
Tree-Maps: a space-filling approach to the visualization of hierarchical information structures
VIS '91 Proceedings of the 2nd conference on Visualization '91
Detecting Flaws and Intruders with Visual Data Analysis
IEEE Computer Graphics and Applications
Passive visual fingerprinting of network attack tools
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
PortVis: a tool for port-based detection of security events
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
ACM SIGGRAPH Computer Graphics
LISA '02 Proceedings of the 16th USENIX conference on System administration
A Visual Exploration Process for the Analysis of Internet Routing Data
Proceedings of the 14th IEEE Visualization 2003 (VIS'03)
Visual Firewall: Real-time Network Security Monito
VIZSEC '05 Proceedings of the IEEE Workshops on Visualization for Computer Security
A Visualization Methodology for Characterization of Network Scans
VIZSEC '05 Proceedings of the IEEE Workshops on Visualization for Computer Security
Improving the computer forensic analysis process through visualization
Communications of the ACM - Next-generation cyber forensics
A Hybrid Intrusion Detection and Visualization System
ECBS '06 Proceedings of the 13th Annual IEEE International Symposium and Workshop on Engineering of Computer Based Systems
Hierarchical Visualization of Network Intrusion Detection Data
IEEE Computer Graphics and Applications
Security Data Visualization
CluVis: dual-domain visual exploration of cluster/network metadata
ACM-SE 45 Proceedings of the 45th annual southeast regional conference
A study in using neural networks for anomaly and misuse detection
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Integration of mobility and intrusion detection for wireless ad hoc networks: Research Articles
International Journal of Communication Systems
HICSS '07 Proceedings of the 40th Annual Hawaii International Conference on System Sciences
Mapping and visualizing the internet
ATEC '00 Proceedings of the annual conference on USENIX Annual Technical Conference
Bridging the host-network divide: survey, taxonomy, and solution
LISA '06 Proceedings of the 20th conference on Large Installation System Administration
Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents
International Journal of Security and Networks
Forensic analysis of SCADA systems and networks
International Journal of Security and Networks
On the (un)reliability of eavesdropping
International Journal of Security and Networks
Using PLSI-U to detect insider threats by datamining e-mail
International Journal of Security and Networks
A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks
International Journal of Security and Networks
Adaptive clustering for scalable key management in dynamic group communications
International Journal of Security and Networks
Formal modelling and analysis of XML firewall for service-oriented systems
International Journal of Security and Networks
Firewall filtering rules analysis for anomalies detection
International Journal of Security and Networks
PVFS: A Probabilistic Voting-based Filtering Scheme in Wireless Sensor Networks
International Journal of Security and Networks
Verifying security protocols by knowledge analysis
International Journal of Security and Networks
An agent-based framework for intrusion detection alert verification and event correlation
International Journal of Security and Networks
Secure user-identification and key distribution scheme preserving anonymity
International Journal of Security and Networks
ID-based threshold proxy signcryption scheme from bilinear pairings
International Journal of Security and Networks
A Survey on Visualization for Wireless Security
NCM '08 Proceedings of the 2008 Fourth International Conference on Networked Computing and Advanced Information Management - Volume 01
An one-way function based framework for pairwise key establishment in sensor networks
International Journal of Security and Networks
Clique-based group key assignment in Wireless Sensor Networks
International Journal of Security and Networks
NTP-DownloadT: a conformance test tool for secured mobile download services
International Journal of Security and Networks
An iris and retina multimodal biometric system
International Journal of Security and Networks
Secure hybrid routing with micro/macro-mobility handoff mechanisms for urban wireless mesh networks
International Journal of Security and Networks
Wireless Communications & Mobile Computing
Proximity-based authentication of mobile devices
International Journal of Security and Networks
Secure pairing of interface constrained devices
International Journal of Security and Networks
Secure pairing with biometrics
International Journal of Security and Networks
Seeing-Is-Believing: using camera phones for human-verifiable authentication
International Journal of Security and Networks
Using audio in secure device pairing
International Journal of Security and Networks
User-aided data authentication
International Journal of Security and Networks
Standards for security associations in personal networks: a comparative analysis
International Journal of Security and Networks
Designing user studies for security applications: a case study with wireless network configuration
International Journal of Security and Networks
An evaluation of connection characteristics for separating network attacks
International Journal of Security and Networks
Deriving a closed-form expression for worm-scanning strategies
International Journal of Security and Networks
An efficient One-Time Password authentication scheme using a smart card
International Journal of Security and Networks
Using link RTT to passively detect unapproved wireless nodes
International Journal of Security and Networks
Overview of satellite communication networks security: introduction of EAP
International Journal of Security and Networks
An escrow-less identity-based group-key agreement protocol for dynamic peer groups
International Journal of Security and Networks
Intrusion Detection System for Denial-of-Service flooding attacks in SIP communication networks
International Journal of Security and Networks
A Proactive Secret Sharing Scheme in matrix projection method
International Journal of Security and Networks
TKS: a transition key management scheme for secure application level multicast
International Journal of Security and Networks
Handling inheritance violation for secure interoperation of heterogeneous systems
International Journal of Security and Networks
Visibility: a novel concept for characterising provable network digital evidences
International Journal of Security and Networks
Black-hole-resistant ENADAIR-based routing protocol for Mobile Ad hoc Networks
International Journal of Security and Networks
Attacks and countermeasures in multi-hop Cognitive Radio Networks
International Journal of Security and Networks
A backpressure technique for filtering spoofed traffic at upstream routers
International Journal of Security and Networks
Authentication and secret search mechanisms for RFID-aware wireless sensor networks
International Journal of Security and Networks
An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks
International Journal of Security and Networks
Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks
International Journal of Security and Networks
Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks
International Journal of Security and Networks
Lightweight authentication protocol for mobile RFID networks
International Journal of Security and Networks
A cross-layer authentication design for secure video transportation in wireless sensor network
International Journal of Security and Networks
Flow-net methodology for accountability in wireless networks
IEEE Network: The Magazine of Global Internetworking
An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing
International Journal of Security and Networks
International Journal of Security and Networks
Trust in RFID-enabled Supply-Chain Management
International Journal of Security and Networks
On the security of RFID devices against implementation attacks
International Journal of Security and Networks
Secure and efficient data transmission in RFID sensor networks
International Journal of Security and Networks
Security and privacy on low-cost Radio Frequency Identification systems
International Journal of Security and Networks
Looking at a class of RFID APs through GNY logic
International Journal of Security and Networks
Radio frequency identification: a case study of healthcare organisations
International Journal of Security and Networks
A ubiquitous mobile telemedicine system for the elderly using RFID
International Journal of Security and Networks
Perceived barriers to the widespread commercial use of Radio Frequency Identification technology
International Journal of Security and Networks
Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security
International Journal of Security and Networks
Security assessments of IEEE 802.15.4 standard based on X.805 framework
International Journal of Security and Networks
Experimental analysis of application-level intrusion detection algorithms
International Journal of Security and Networks
Picviz: finding a needle in a haystack
WASL'08 Proceedings of the First USENIX conference on Analysis of system logs
Enhancing Intrusion Detection System with proximity information
International Journal of Security and Networks
Efficient decision tree for protocol analysis in intrusion detection
International Journal of Security and Networks
An FPGA-based system for tracking digital information transmitted via Peer-to-Peer protocols
International Journal of Security and Networks
On the scalability of Delay-Tolerant Botnets
International Journal of Security and Networks
Detect DDoS flooding attacks in mobile ad hoc networks
International Journal of Security and Networks
Place lab: device positioning using radio beacons in the wild
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Accountability for wireless LANs, ad hoc networks, and wireless mesh networks
IEEE Communications Magazine
Intrusion and misuse detection in large-scale systems
IEEE Computer Graphics and Applications
Interactive analysis of computer scenarios through parallel coordinates graphics
ICCSA'12 Proceedings of the 12th international conference on Computational Science and Its Applications - Volume Part IV
Flexible web visualization for alert-based network security analytics
Proceedings of the Tenth Workshop on Visualization for Cyber Security
Hi-index | 0.00 |
Network security is an important area in computer science. Although great efforts have already been made regarding security problems, networks are still threatened by all kinds of potential attacks, which may lead to huge damage and loss. Log files are main sources for security analysis. However, log files are not user friendly. It is laborious work to obtain useful information from log files. Compared with log files, visualization systems designed for security purposes provide more perceptive and effective sources for security analysis. Most security visualization systems are based on log files. In this paper, we provide a survey on visualization designs for computer network security. In this survey, we looked into different security visual analytics, and we organized them into five categories. Copyright © 2011 John Wiley & Sons, Ltd.