The state of the art in visualizing multivariate networks

C Nobre, M Meyer, M Streit, A Lex - Computer Graphics Forum, 2019 - Wiley Online Library
Multivariate networks are made up of nodes and their relationships (links), but also data
about those nodes and links as attributes. Most real‐world networks are associated with …

A survey of visualization systems for network security

H Shiravi, A Shiravi, AA Ghorbani - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Security Visualization is a very young term. It expresses the idea that common visualization
techniques have been designed for use cases that are not supportive of security-related …

[图书][B] Handbook of graph drawing and visualization

R Tamassia - 2013 - books.google.com
Get an In-Depth Understanding of Graph Drawing Techniques, Algorithms, Software, and
Applications The Handbook of Graph Drawing and Visualization provides a broad, up-to …

A survey of network flow applications

B Li, J Springer, G Bebis, MH Gunes - Journal of Network and Computer …, 2013 - Elsevier
It has been over 16 years since Cisco's NetFlow was patented in 1996. Extensive research
has been conducted since then and many applications have been developed. In this survey …

Method and apparatus for visualizing the health of datacenter objects

KN Wong, M Bednar - US Patent 9,124,488, 2015 - Google Patents
Embodiments of the present invention provide a dashboard that displays an overview of a
datacenter's health which helps prioritize, monitor, and troubleshoot problems. In particular …

Interactive three-dimensional visualization of network intrusion detection data for machine learning

W Zong, YW Chow, W Susilo - Future Generation Computer Systems, 2020 - Elsevier
The threat of cyber-attacks is on the rise in the digital world today. As such, effective
cybersecurity solutions are becoming increasingly important for detecting and combating …

Situ: Identifying and explaining suspicious behavior in networks

JR Goodall, ED Ragan, CA Steed… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
Despite the best efforts of cyber security analysts, networked computing assets are routinely
compromised, resulting in the loss of intellectual property, the disclosure of state secrets …

[PDF][PDF] A Survey Visualization Systems For Network Security

HK Mistry, C Mavani, A Goswami… - … : Theory and Practice, 2024 - researchgate.net
This paper explores the development and application of visualization tools and techniques
for network security and highlights their role in addressing cyber security challenges. It …

Demonstration of a high speed 4-channel integrated silicon photonics WDM link with hybrid silicon lasers

A Alduino, L Liao, R Jones, M Morse, B Kim… - … Research, Silicon and …, 2010 - opg.optica.org
The demonstration of a 4λ× 10Gbps Silicon Photonics CWDM link integrating all optical
components, electronics and packaging technologies required for system integration is …

Visualization evaluation for cyber security: Trends and future directions

D Staheli, T Yu, RJ Crouser, S Damodaran… - Proceedings of the …, 2014 - dl.acm.org
The Visualization for Cyber Security research community (VizSec) addresses longstanding
challenges in cyber security by adapting and evaluating information visualization techniques …