The state of the art in visualizing multivariate networks
Multivariate networks are made up of nodes and their relationships (links), but also data
about those nodes and links as attributes. Most real‐world networks are associated with …
about those nodes and links as attributes. Most real‐world networks are associated with …
A survey of visualization systems for network security
H Shiravi, A Shiravi, AA Ghorbani - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Security Visualization is a very young term. It expresses the idea that common visualization
techniques have been designed for use cases that are not supportive of security-related …
techniques have been designed for use cases that are not supportive of security-related …
[图书][B] Handbook of graph drawing and visualization
R Tamassia - 2013 - books.google.com
Get an In-Depth Understanding of Graph Drawing Techniques, Algorithms, Software, and
Applications The Handbook of Graph Drawing and Visualization provides a broad, up-to …
Applications The Handbook of Graph Drawing and Visualization provides a broad, up-to …
A survey of network flow applications
B Li, J Springer, G Bebis, MH Gunes - Journal of Network and Computer …, 2013 - Elsevier
It has been over 16 years since Cisco's NetFlow was patented in 1996. Extensive research
has been conducted since then and many applications have been developed. In this survey …
has been conducted since then and many applications have been developed. In this survey …
Method and apparatus for visualizing the health of datacenter objects
KN Wong, M Bednar - US Patent 9,124,488, 2015 - Google Patents
Embodiments of the present invention provide a dashboard that displays an overview of a
datacenter's health which helps prioritize, monitor, and troubleshoot problems. In particular …
datacenter's health which helps prioritize, monitor, and troubleshoot problems. In particular …
Interactive three-dimensional visualization of network intrusion detection data for machine learning
The threat of cyber-attacks is on the rise in the digital world today. As such, effective
cybersecurity solutions are becoming increasingly important for detecting and combating …
cybersecurity solutions are becoming increasingly important for detecting and combating …
Situ: Identifying and explaining suspicious behavior in networks
Despite the best efforts of cyber security analysts, networked computing assets are routinely
compromised, resulting in the loss of intellectual property, the disclosure of state secrets …
compromised, resulting in the loss of intellectual property, the disclosure of state secrets …
[PDF][PDF] A Survey Visualization Systems For Network Security
This paper explores the development and application of visualization tools and techniques
for network security and highlights their role in addressing cyber security challenges. It …
for network security and highlights their role in addressing cyber security challenges. It …
Demonstration of a high speed 4-channel integrated silicon photonics WDM link with hybrid silicon lasers
A Alduino, L Liao, R Jones, M Morse, B Kim… - … Research, Silicon and …, 2010 - opg.optica.org
The demonstration of a 4λ× 10Gbps Silicon Photonics CWDM link integrating all optical
components, electronics and packaging technologies required for system integration is …
components, electronics and packaging technologies required for system integration is …
Visualization evaluation for cyber security: Trends and future directions
The Visualization for Cyber Security research community (VizSec) addresses longstanding
challenges in cyber security by adapting and evaluating information visualization techniques …
challenges in cyber security by adapting and evaluating information visualization techniques …