{"id":"https://openalex.org/W1943462367","doi":"https://doi.org/10.1109/vizsec.2015.7312768","title":"SNAPS: Semantic network traffic analysis through projection and selection","display_name":"SNAPS: Semantic network traffic analysis through projection and selection","publication_year":2015,"publication_date":"2015-10-25","ids":{"openalex":"https://openalex.org/W1943462367","doi":"https://doi.org/10.1109/vizsec.2015.7312768","mag":"1943462367"},"language":"en","primary_location":{"id":"doi:10.1109/vizsec.2015.7312768","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vizsec.2015.7312768","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE Symposium on Visualization for Cyber Security (VizSec)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013797659","display_name":"Bram C.M. Cappers","orcid":"https://orcid.org/0009-0003-4568-5568"},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Bram C.M. Cappers","raw_affiliation_strings":["Department of Mathematics and Computer Science, Eindhoven University of Technology, The Netherlands","Department of Mathematics and Computer Science; Eindhoven University of Technology; the Netherlands"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Eindhoven University of Technology, The Netherlands","institution_ids":["https://openalex.org/I83019370"]},{"raw_affiliation_string":"Department of Mathematics and Computer Science; Eindhoven University of Technology; the Netherlands","institution_ids":["https://openalex.org/I83019370"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051025031","display_name":"Jarke J. van Wijk","orcid":"https://orcid.org/0000-0002-5128-976X"},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Jarke J. van Wijk","raw_affiliation_strings":["Department of Mathematics and Computer Science, Eindhoven University of Technology, The Netherlands","Department of Mathematics and Computer Science; Eindhoven University of Technology; the Netherlands"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Eindhoven University of Technology, The Netherlands","institution_ids":["https://openalex.org/I83019370"]},{"raw_affiliation_string":"Department of Mathematics and Computer Science; Eindhoven University of Technology; the Netherlands","institution_ids":["https://openalex.org/I83019370"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5013797659"],"corresponding_institution_ids":["https://openalex.org/I83019370"],"apc_list":null,"apc_paid":null,"fwci":3.8482,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.93805353,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7399507164955139},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.6291600465774536},{"id":"https://openalex.org/keywords/projection","display_name":"Projection (relational algebra)","score":0.4854617714881897},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.43956854939460754},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.1356867551803589}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7399507164955139},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.6291600465774536},{"id":"https://openalex.org/C57493831","wikidata":"https://www.wikidata.org/wiki/Q3134666","display_name":"Projection (relational algebra)","level":2,"score":0.4854617714881897},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.43956854939460754},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.1356867551803589}],"mesh":[],"locations_count":6,"locations":[{"id":"doi:10.1109/vizsec.2015.7312768","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vizsec.2015.7312768","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE Symposium on Visualization for Cyber Security (VizSec)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.tue.nl:openaire_cris_publications/02337510-341b-4be8-bdd7-523b1d05b02e","is_oa":false,"landing_page_url":"https://research.tue.nl/en/publications/02337510-341b-4be8-bdd7-523b1d05b02e","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cappers, B C M & van Wijk, J J 2015, SNAPS : semantic network traffic analysis through projection and selection. in L Harrison, N Prigent, S Engle, D Best & J Goodall (eds), 2015 IEEE Symposium on Visualization for Cyber Security (VizSec), 25 October 2015, Chicago, Illinois., 6, Institute of Electrical and Electronics Engineers, Piscataway, pp. 1-8. https://doi.org/10.1109/VIZSEC.2015.7312768","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:884381","is_oa":false,"landing_page_url":"http://library.tue.nl/csp/dare/LinkToRepository.csp?recordnumber=884381","pdf_url":null,"source":{"id":"https://openalex.org/S4406923046","display_name":"TU/e Research Portal (Eindhoven University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:oai:library.tue.nl:856961","is_oa":false,"landing_page_url":"http://repository.tue.nl/856961","pdf_url":null,"source":{"id":"https://openalex.org/S4406923046","display_name":"TU/e Research Portal (Eindhoven University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:oai:library.tue.nl:884381","is_oa":false,"landing_page_url":"http://repository.tue.nl/884381","pdf_url":null,"source":{"id":"https://openalex.org/S4406923046","display_name":"TU/e Research Portal (Eindhoven University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:tue:oai:pure.tue.nl:publications/02337510-341b-4be8-bdd7-523b1d05b02e","is_oa":false,"landing_page_url":"https://research.tue.nl/nl/publications/02337510-341b-4be8-bdd7-523b1d05b02e","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"2015 IEEE Symposium on Visualization for Cyber Security (VizSec), 25 October 2015, Chicago, Illinois, 1 - 8","raw_type":"info:eu-repo/semantics/conferencepaper"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W654785806","https://openalex.org/W1484813121","https://openalex.org/W1486461328","https://openalex.org/W1552584884","https://openalex.org/W1572876171","https://openalex.org/W1655226010","https://openalex.org/W1965052672","https://openalex.org/W1966320996","https://openalex.org/W2000089542","https://openalex.org/W2003852082","https://openalex.org/W2010065958","https://openalex.org/W2011493390","https://openalex.org/W2024838825","https://openalex.org/W2028634151","https://openalex.org/W2054515823","https://openalex.org/W2063329049","https://openalex.org/W2122646361","https://openalex.org/W2124890572","https://openalex.org/W2126415191","https://openalex.org/W2132068130","https://openalex.org/W2144615061","https://openalex.org/W4231713821","https://openalex.org/W4241024087","https://openalex.org/W4252261106","https://openalex.org/W6629102967"],"related_works":["https://openalex.org/W2970622411","https://openalex.org/W1485063768","https://openalex.org/W2118336583","https://openalex.org/W2751504412","https://openalex.org/W1990422213","https://openalex.org/W2115461783","https://openalex.org/W2351009956","https://openalex.org/W4225259759","https://openalex.org/W2769426941","https://openalex.org/W1970811333"],"abstract_inverted_index":{"Most":[0],"network":[1,31,67,86],"traffic":[2,73,87],"analysis":[3,88,137],"applications":[4],"are":[5,25,42],"designed":[6,27],"to":[7,20,28,125],"discover":[8],"malicious":[9],"activity":[10],"by":[11],"only":[12],"relying":[13],"on":[14,49,153],"high-level":[15],"flow-based":[16],"message":[17,60],"properties.":[18],"However,":[19],"detect":[21],"security":[22,64],"breaches":[23],"that":[24],"specifically":[26],"target":[29],"one":[30],"(e.g.,":[32],"Advanced":[33,165],"Persistent":[34,166],"Threats),":[35],"deep":[36],"packet":[37],"inspection":[38],"and":[39,77,96,119,138,161],"anomaly":[40,128],"detection":[41,160],"indispensible.":[43],"In":[44,69],"this":[45,147],"paper,":[46],"we":[47,51,79,149],"focus":[48],"how":[50],"can":[52],"support":[53],"experts":[54],"in":[55,100,112,168],"discovering":[56],"whether":[57],"anomalies":[58,95],"at":[59,66],"level":[61,102],"imply":[62],"a":[63,81],"risk":[65],"level.":[68],"SNAPS":[70],"(Semantic":[71],"Network":[72],"Analysis":[74],"through":[75,104],"Projection":[76],"Selection),":[78],"provide":[80],"bottom-up":[82],"pixel-oriented":[83],"approach":[84,132],"for":[85,134,158],"where":[89],"the":[90,105,123,131,144,159],"expert":[91,124],"starts":[92],"with":[93],"low-level":[94],"iteratively":[97,126],"gains":[98],"insight":[99],"higher":[101],"events":[103],"creation":[106],"of":[107,110,146,163],"multiple":[108],"selections":[109],"interest":[111],"parallel.":[113],"The":[114],"tight":[115],"integration":[116],"between":[117],"visualization":[118],"machine":[120],"learning":[121],"enables":[122],"refine":[127],"scores,":[129],"making":[130],"suitable":[133],"both":[135],"post-traffic":[136],"online":[139],"monitoring":[140],"tasks.":[141],"To":[142],"illustrate":[143],"effectiveness":[145],"approach,":[148],"present":[150],"example":[151],"explorations":[152],"two":[154],"real-world":[155],"data":[156],"sets":[157],"understanding":[162],"potential":[164],"Threats":[167],"progress.":[169]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":4}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
