Nature-inspired techniques in the context of fraud detection
Electronic fraud is highly lucrative, with estimates suggesting these crimes to be worth
millions of dollars annually. Because of its complex nature, electronic fraud detection is …
millions of dollars annually. Because of its complex nature, electronic fraud detection is …
A survey on information visualization for network and service management
Network and service management encompasses a set of activities, methods, procedures,
and tools, whose ultimate goal is to guarantee the proper functioning of a networked system …
and tools, whose ultimate goal is to guarantee the proper functioning of a networked system …
idMAS-SQL: intrusion detection based on MAS to detect and block SQL injection through data mining
This study presents a multiagent architecture aimed at detecting SQL injection attacks, which
are one of the most prevalent threats for modern databases. The proposed architecture is …
are one of the most prevalent threats for modern databases. The proposed architecture is …
A hybrid space-filling and force-directed layout method for visualizing multiple-category graphs
Many graphs used in real-world applications consist of nodes belonging to more than one
category. We call such graph ldquomultiple-category graphsrdquo. Social networks are …
category. We call such graph ldquomultiple-category graphsrdquo. Social networks are …
CAT: A hierarchical image browser using a rectangle packing technique
The recent revolution of digital camera technology has resulted in much larger collections of
images. Image browsing techniques thus become increasingly important for overview and …
images. Image browsing techniques thus become increasingly important for overview and …
Visual analysis of network traffic for resource planning, interactive monitoring, and interpretation of security threats
The Internet has become a wild place: malicious code is spread on personal computers
across the world, deploying botnets ready to attack the network infrastructure. The vast …
across the world, deploying botnets ready to attack the network infrastructure. The vast …
Visual variables and configuration of software maps
Software maps provide a general-purpose interactive user interface and information display
in software analytics. This paper classifies software maps as a containment-based treemap …
in software analytics. This paper classifies software maps as a containment-based treemap …
Advanced visual metaphors and techniques for software maps
Software maps provide a general-purpose interactive user interface and information display
for software analytics tools. This paper systematically introduces and classifies software …
for software analytics tools. This paper systematically introduces and classifies software …
DAEDALUS-VIZ: novel real-time 3D visualization for darknet monitoring-based alert system
A darknet is a set of unused IP addresses whose monitoring is an effective way of detecting
malicious activities on the Internet. We have developed an alert system called DAEDALUS …
malicious activities on the Internet. We have developed an alert system called DAEDALUS …
A survey of security visualization for computer network logs
Network security is an important area in computer science. Although great efforts have
already been made regarding security problems, networks are still threatened by all kinds of …
already been made regarding security problems, networks are still threatened by all kinds of …