메뉴 건너뛰기




Volumn , Issue , 2010, Pages 34-45

Visualizing graph dynamics and similarity for enterprise network security and management

Author keywords

enterprise networks; graphs; local context; policy assessment; security; visual graph data mining; visualization

Indexed keywords

DATA MINING; DATA VISUALIZATION; DYNAMICS; FLOW VISUALIZATION; GRAPH THEORY; HIERARCHICAL CLUSTERING; VISUALIZATION;

EID: 78149458354     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1850795.1850799     Document Type: Conference Paper
Times cited : (25)

References (31)
  • 9
    • 84898878437 scopus 로고    scopus 로고
    • Visual analysis of corporate network intelligence: Abstracting and reasoning on yesterdays for acting today
    • Sacramento, CA, October 29
    • D. Lalanne, E. Bertini, P. Hertzog, and P. Bados. Visual analysis of corporate network intelligence: Abstracting and reasoning on yesterdays for acting today. In Proc. of Workshop on Visualization for Computer Security (VizSec'07), pages 115-130, Sacramento, CA, October 29 2007.
    • (2007) Proc. of Workshop on Visualization for Computer Security (VizSec'07) , pp. 115-130
    • Lalanne, D.1    Bertini, E.2    Hertzog, P.3    Bados, P.4
  • 11
    • 35048904658 scopus 로고    scopus 로고
    • Comparison of distance measures for graph-based clustering of documents
    • Graph Based Representations in Pattern Recognition, Springer
    • A. Schenker, M. Last, H. Bunke, and A. Kandel. Comparison of distance measures for graph-based clustering of documents. In Graph Based Representations in Pattern Recognition, Springer LNCS, volume 2726, pages 187-263, 2003.
    • (2003) LNCS , vol.2726 , pp. 187-263
    • Schenker, A.1    Last, M.2    Bunke, H.3    Kandel, A.4
  • 12
    • 0032024433 scopus 로고    scopus 로고
    • A graph distance metric based on the maximal common subgraph
    • March
    • H. Bunke and K. Shearer. A graph distance metric based on the maximal common subgraph. Pattern Recognition Letters, 19(3-4):255-259, March 1998.
    • (1998) Pattern Recognition Letters , vol.19 , Issue.3-4 , pp. 255-259
    • Bunke, H.1    Shearer, K.2
  • 15
    • 34147194284 scopus 로고    scopus 로고
    • Graph Sequence Visualisation and its Application to Computer Network Monitoring and Abnormal Event Detection
    • chapter Springer Berlin / Heidelberg
    • H. Bunke, P. Dickinson, A. Humm, Ch. Irniger, and M. Kraetzl. Applied Graph Theory in Computer Vision and Pattern Recognition, volume 52, chapter Graph Sequence Visualisation and its Application to Computer Network Monitoring and Abnormal Event Detection, pages 227-245. Springer Berlin / Heidelberg, 2007.
    • (2007) Applied Graph Theory in Computer Vision and Pattern Recognition , vol.52 , pp. 227-245
    • Bunke, H.1    Dickinson, P.2    Humm, A.3    Irniger, Ch.4    Kraetzl, M.5
  • 16
    • 38849162343 scopus 로고    scopus 로고
    • Computing communities in large networks using random walks
    • P. Pons and M. Latapy. Computing communities in large networks using random walks. Journal of Graph Algorithms and Applications, 10(2):191-218, 2006.
    • (2006) Journal of Graph Algorithms and Applications , vol.10 , Issue.2 , pp. 191-218
    • Pons, P.1    Latapy, M.2
  • 17
    • 74049087026 scopus 로고    scopus 로고
    • Community detection in graphs
    • February
    • S. Fortunato. Community detection in graphs. Physics Reports, 486(3-5):75-174, February 2010.
    • (2010) Physics Reports , vol.486 , Issue.3-5 , pp. 75-174
    • Fortunato, S.1
  • 18
    • 84950632109 scopus 로고
    • Objective criteria for the evaluation of clustering methods
    • Dec.
    • W.M. Rand. Objective criteria for the evaluation of clustering methods. Journal of the American Statistical Association, 66(336):846-850, Dec. 1971.
    • (1971) Journal of the American Statistical Association , vol.66 , Issue.336 , pp. 846-850
    • Rand, W.M.1
  • 31
    • 78149436804 scopus 로고    scopus 로고
    • Efficient visualization of change events in enterprise networks
    • Baltimore, MD, Aug.28-Sep.1
    • A. Stewart. Efficient visualization of change events in enterprise networks. In Proc. of IEEE Workshop on Enterprise Network Security, pages 1-6, Baltimore, MD, Aug.28-Sep.1 2006.
    • (2006) Proc. of IEEE Workshop on Enterprise Network Security , pp. 1-6
    • Stewart, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.