-
1
-
-
80054978961
-
Traffic Causality Graphs: Profiling network applications through temporal and spatial causality of flows
-
H. Asai, K. Fukuda, and H. Esaki. Traffic Causality Graphs: Profiling network applications through temporal and spatial causality of flows. In ITC'11, pages 95-102, 2011.
-
(2011)
ITC'11
, pp. 95-102
-
-
Asai, H.1
Fukuda, K.2
Esaki, H.3
-
2
-
-
78149456361
-
Real-time visualization of network behaviors for situational awareness
-
D. M. Best, S. Bohn, D. Love, A. Wynne, and W. A. Pike. Real-time visualization of network behaviors for situational awareness. In VizSec'10, pages 79-90, 2010.
-
(2010)
VizSec'10
, pp. 79-90
-
-
Best, D.M.1
Bohn, S.2
Love, D.3
Wynne, A.4
Pike, W.A.5
-
3
-
-
84894529357
-
TVi: A visual querying system for network monitoring and anomaly detection
-
A. Boschetti, L. Salgarelli, C. Muelder, and K.-L. Ma. TVi: a visual querying system for network monitoring and anomaly detection. In VizSec'11, page 1, 2011.
-
(2011)
VizSec'11
, pp. 1
-
-
Boschetti, A.1
Salgarelli, L.2
Muelder, C.3
Ma, K.-L.4
-
4
-
-
85076921594
-
Automating network application dependency discovery: Experiences, limitations, and new solutions
-
X. Chen, M. Zhang, Z. M. Mao, and P. Bahl. Automating network application dependency discovery: Experiences, limitations, and new solutions. In OSDI'08, pages 117-130.
-
OSDI'08
, pp. 117-130
-
-
Chen, X.1
Zhang, M.2
Mao, Z.M.3
Bahl, P.4
-
5
-
-
33645237139
-
Countering security information overload through alert and packet visualization
-
G. Conti, K. Abdullah, J. Grizzard, J. Stasko, J. A. Copeland, M. Ahamad, H. L. Owen, and C. Lee. Countering security information overload through alert and packet visualization. Computer Graphics & Applications, IEEE, 26(2):60-70, 2006.
-
(2006)
Computer Graphics & Applications, IEEE
, vol.26
, Issue.2
, pp. 60-70
-
-
Conti, G.1
Abdullah, K.2
Grizzard, J.3
Stasko, J.4
Copeland, J.A.5
Ahamad, M.6
Owen, H.L.7
Lee, C.8
-
7
-
-
33749537716
-
Visual correlation of host processes and network traffic
-
G. A. Fink, P. Muessig, and C. North. Visual correlation of host processes and network traffic. In VizSec'05, page 2, 2005.
-
(2005)
VizSec'05
, pp. 2
-
-
Fink, G.A.1
Muessig, P.2
North, C.3
-
8
-
-
70450078118
-
Vulnerability & attack injection for web applications
-
J. Fonseca, M. Vieira, and H. Madeira. Vulnerability & attack injection for web applications. In DSN'09, pages 93-102, 2009.
-
(2009)
DSN'09
, pp. 93-102
-
-
Fonseca, J.1
Vieira, M.2
Madeira, H.3
-
9
-
-
77949384586
-
Visualization is better! A comparative evaluation
-
J. R. Goodall. Visualization is better! A comparative evaluation. In VizSec'09, pages 57-68, 2009.
-
(2009)
VizSec'09
, pp. 57-68
-
-
Goodall, J.R.1
-
10
-
-
42149143451
-
Network monitoring using traffic dispersion graphs (TDGs)
-
M. Iliofotou, P. Pappu, M. Faloutsos, M. Mitzenmacher, S. Singh, and G. Varghese. Network monitoring using traffic dispersion graphs (TDGs). In IMC'07, pages 315-320, 2007.
-
(2007)
IMC'07
, pp. 315-320
-
-
Iliofotou, M.1
Pappu, P.2
Faloutsos, M.3
Mitzenmacher, M.4
Singh, S.5
Varghese, G.6
-
11
-
-
35948940663
-
Monitoring network traffic with radial traffic analyzer
-
D. A. Keim, F. Mansmann, J. Schneidewind, and T. Schreck. Monitoring network traffic with radial traffic analyzer. In VAST'06, pages 123-128, 2006.
-
(2006)
VAST'06
, pp. 123-128
-
-
Keim, D.A.1
Mansmann, F.2
Schneidewind, J.3
Schreck, T.4
-
13
-
-
20444456753
-
SnortView: Visualization system of Snort logs
-
H. Koike and K. Ohno. SnortView: Visualization system of Snort logs. In VizSEC/DMSEC'04, pages 143-147, 2004.
-
(2004)
VizSEC/DMSEC'04
, pp. 143-147
-
-
Koike, H.1
Ohno, K.2
-
14
-
-
85076740771
-
WebProphet: Automating performance prediction for web services
-
Z. Li, M. Zhang, Z. Zhu, Y. Chen, A. G. Greenberg, and Y.-M. Wang. WebProphet: Automating performance prediction for web services. In NSDI'10, pages 143-158, 2010.
-
(2010)
NSDI'10
, pp. 143-158
-
-
Li, Z.1
Zhang, M.2
Zhu, Z.3
Chen, Y.4
Greenberg, A.G.5
Wang, Y.-M.6
-
17
-
-
84862606327
-
A survey of visualization systems for network security
-
H. Shiravi, A. Shiravi, and A. A. Ghorbani. A survey of visualization systems for network security. IEEE Trans. Vis. Comput. Graph., 18(8):1313-1329, 2012.
-
(2012)
IEEE Trans. Vis. Comput. Graph
, vol.18
, Issue.8
, pp. 1313-1329
-
-
Shiravi, H.1
Shiravi, A.2
Ghorbani, A.A.3
-
18
-
-
84881081209
-
Crucial nodes centric visual monitoring and analysis of computer networks
-
H. Song, C. Muelder, and K.-L. Ma. Crucial nodes centric visual monitoring and analysis of computer networks. In CyberSecurity, pages 16-23, 2012.
-
(2012)
CyberSecurity
, pp. 16-23
-
-
Song, H.1
Muelder, C.2
Ma, K.-L.3
-
19
-
-
84890834796
-
ReSurf: Reconstructing web-surfing activity from network traffic
-
G. Xie, M. Iliofotou, T. Karagiannis, M. Faloutsos, and Y. Jin. ReSurf: Reconstructing web-surfing activity from network traffic. In IFIP Networking Conference, pages 1-9, 2013.
-
(2013)
IFIP Networking Conference
, pp. 1-9
-
-
Xie, G.1
Iliofotou, M.2
Karagiannis, T.3
Faloutsos, M.4
Jin, Y.5
-
20
-
-
81055138290
-
Detecting infection onset with behavior-based policies
-
K. Xu, D. Yao, Q. Ma, and A. Crowell. Detecting infection onset with behavior-based policies. In NSS'11, pages 57-64.
-
NSS'11
, pp. 57-64
-
-
Xu, K.1
Yao, D.2
Ma, Q.3
Crowell, A.4
-
21
-
-
84874838079
-
Cross-layer detection of malicious websites
-
L. Xu, Z. Zhan, S. Xu, and K. Ye. Cross-layer detection of malicious websites. In CODASPY'13, pages 141-152, 2013.
-
(2013)
CODASPY'13
, pp. 141-152
-
-
Xu, L.1
Zhan, Z.2
Xu, S.3
Ye, K.4
-
22
-
-
56749157072
-
Visualization of rule-based programming
-
W. Yu and R. M. Verma. Visualization of rule-based programming. In SAC'08, pages 1258-1259, 2008.
-
(2008)
SAC'08
, pp. 1258-1259
-
-
Yu, W.1
Verma, R.M.2
-
24
-
-
84864242247
-
User intention-based traffic dependence analysis for anomaly detection
-
H. Zhang, W. Banick, D. Yao, and N. Ramakrishnan. User intention-based traffic dependence analysis for anomaly detection. In Security and Privacy Workshops (SPW), 2012 IEEE Symposium on, pages 104-112, 2012.
-
(2012)
Security and Privacy Workshops (SPW 2012 IEEE Symposium on
, pp. 104-112
-
-
Zhang, H.1
Banick, W.2
Yao, D.3
Ramakrishnan, N.4
-
25
-
-
84984908573
-
Detection of stealthy malware activities with traffic causality and scalable triggering relation discovery
-
H. Zhang, D. Yao, and N. Ramakrishnan. Detection of stealthy malware activities with traffic causality and scalable triggering relation discovery. In ASIACCS'14, pages 39-50, 2014.
-
(2014)
ASIACCS'14
, pp. 39-50
-
-
Zhang, H.1
Yao, D.2
Ramakrishnan, N.3
|