Nature-inspired techniques in the context of fraud detection

M Behdad, L Barone, M Bennamoun… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
Electronic fraud is highly lucrative, with estimates suggesting these crimes to be worth
millions of dollars annually. Because of its complex nature, electronic fraud detection is …

A survey on information visualization for network and service management

VT Guimaraes, CMDS Freitas, R Sadre… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Network and service management encompasses a set of activities, methods, procedures,
and tools, whose ultimate goal is to guarantee the proper functioning of a networked system …

idMAS-SQL: intrusion detection based on MAS to detect and block SQL injection through data mining

CI Pinzon, JF De Paz, A Herrero, E Corchado, J Bajo… - Information …, 2013 - Elsevier
This study presents a multiagent architecture aimed at detecting SQL injection attacks, which
are one of the most prevalent threats for modern databases. The proposed architecture is …

A hybrid space-filling and force-directed layout method for visualizing multiple-category graphs

T Itoh, C Muelder, KL Ma, J Sese - 2009 IEEE Pacific …, 2009 - ieeexplore.ieee.org
Many graphs used in real-world applications consist of nodes belonging to more than one
category. We call such graph ldquomultiple-category graphsrdquo. Social networks are …

CAT: A hierarchical image browser using a rectangle packing technique

A Gomi, R Miyazaki, T Itoh, J Li - 2008 12th International …, 2008 - ieeexplore.ieee.org
The recent revolution of digital camera technology has resulted in much larger collections of
images. Image browsing techniques thus become increasingly important for overview and …

Visual analysis of network traffic for resource planning, interactive monitoring, and interpretation of security threats

F Mansmann, DA Keim, SC North… - … on Visualization and …, 2007 - ieeexplore.ieee.org
The Internet has become a wild place: malicious code is spread on personal computers
across the world, deploying botnets ready to attack the network infrastructure. The vast …

Visual variables and configuration of software maps

D Limberger, W Scheibel, J Döllner, M Trapp - Journal of Visualization, 2023 - Springer
Software maps provide a general-purpose interactive user interface and information display
in software analytics. This paper classifies software maps as a containment-based treemap …

Advanced visual metaphors and techniques for software maps

D Limberger, W Scheibel, J Döllner… - Proceedings of the 12th …, 2019 - dl.acm.org
Software maps provide a general-purpose interactive user interface and information display
for software analytics tools. This paper systematically introduces and classifies software …

DAEDALUS-VIZ: novel real-time 3D visualization for darknet monitoring-based alert system

D Inoue, M Eto, K Suzuki, M Suzuki… - Proceedings of the ninth …, 2012 - dl.acm.org
A darknet is a set of unused IP addresses whose monitoring is an effective way of detecting
malicious activities on the Internet. We have developed an alert system called DAEDALUS …

A survey of security visualization for computer network logs

Y Zhang, Y Xiao, M Chen, J Zhang… - Security and …, 2012 - Wiley Online Library
Network security is an important area in computer science. Although great efforts have
already been made regarding security problems, networks are still threatened by all kinds of …