{"id":"https://openalex.org/W1988731235","doi":"https://doi.org/10.1145/1850795.1850797","title":"Proposing a multi-touch interface for intrusion detection environments","display_name":"Proposing a multi-touch interface for intrusion detection environments","publication_year":2010,"publication_date":"2010-09-02","ids":{"openalex":"https://openalex.org/W1988731235","doi":"https://doi.org/10.1145/1850795.1850797","mag":"1988731235"},"language":"en","primary_location":{"id":"doi:10.1145/1850795.1850797","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1850795.1850797","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Seventh International Symposium on Visualization for Cyber Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065104006","display_name":"Jeffrey Guenther","orcid":null},"institutions":[{"id":"https://openalex.org/I18014758","display_name":"Simon Fraser University","ror":"https://ror.org/0213rcc28","country_code":"CA","type":"education","lineage":["https://openalex.org/I18014758"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Jeffrey Guenther","raw_affiliation_strings":["Simon Fraser University, Surrey, BC, Canada","Simon Fraser University, Surrey, BC, CANADA"],"affiliations":[{"raw_affiliation_string":"Simon Fraser University, Surrey, BC, Canada","institution_ids":["https://openalex.org/I18014758"]},{"raw_affiliation_string":"Simon Fraser University, Surrey, BC, CANADA","institution_ids":["https://openalex.org/I18014758"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019864234","display_name":"Fred Volk","orcid":"https://orcid.org/0000-0002-6957-485X"},"institutions":[{"id":"https://openalex.org/I67789559","display_name":"Liberty University","ror":"https://ror.org/00w4qrc49","country_code":"US","type":"education","lineage":["https://openalex.org/I67789559"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Fred Volk","raw_affiliation_strings":["Liberty University, Lynchburg, VA"],"affiliations":[{"raw_affiliation_string":"Liberty University, Lynchburg, VA","institution_ids":["https://openalex.org/I67789559"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040727366","display_name":"Mark Shaneck","orcid":null},"institutions":[{"id":"https://openalex.org/I67789559","display_name":"Liberty University","ror":"https://ror.org/00w4qrc49","country_code":"US","type":"education","lineage":["https://openalex.org/I67789559"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mark Shaneck","raw_affiliation_strings":["Liberty University, Lynchburg, VA"],"affiliations":[{"raw_affiliation_string":"Liberty University, Lynchburg, VA","institution_ids":["https://openalex.org/I67789559"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5065104006"],"corresponding_institution_ids":["https://openalex.org/I18014758"],"apc_list":null,"apc_paid":null,"fwci":0.9561,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.75557317,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"13","last_page":"21"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10799","display_name":"Data Visualization and Analytics","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10799","display_name":"Data Visualization and Analytics","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.989799976348877,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.8273026943206787},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7908178567886353},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.693440318107605},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.5794717669487},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.574711799621582},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5458638072013855},{"id":"https://openalex.org/keywords/interface","display_name":"Interface (matter)","score":0.5334302186965942},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5220734477043152},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.5206679105758667},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.49906373023986816},{"id":"https://openalex.org/keywords/data-visualization","display_name":"Data visualization","score":0.49073708057403564},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.45608872175216675},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.43530482053756714},{"id":"https://openalex.org/keywords/task-analysis","display_name":"Task analysis","score":0.41049593687057495},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.32385605573654175},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.16937273740768433},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1223645806312561},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08328220248222351}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.8273026943206787},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7908178567886353},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.693440318107605},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.5794717669487},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.574711799621582},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5458638072013855},{"id":"https://openalex.org/C113843644","wikidata":"https://www.wikidata.org/wiki/Q901882","display_name":"Interface (matter)","level":4,"score":0.5334302186965942},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5220734477043152},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.5206679105758667},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.49906373023986816},{"id":"https://openalex.org/C172367668","wikidata":"https://www.wikidata.org/wiki/Q6504956","display_name":"Data visualization","level":3,"score":0.49073708057403564},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.45608872175216675},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.43530482053756714},{"id":"https://openalex.org/C175154964","wikidata":"https://www.wikidata.org/wiki/Q380077","display_name":"Task analysis","level":3,"score":0.41049593687057495},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.32385605573654175},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.16937273740768433},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1223645806312561},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08328220248222351},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0},{"id":"https://openalex.org/C129307140","wikidata":"https://www.wikidata.org/wiki/Q6795880","display_name":"Maximum bubble pressure method","level":3,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C157915830","wikidata":"https://www.wikidata.org/wiki/Q2928001","display_name":"Bubble","level":2,"score":0.0},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1850795.1850797","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1850795.1850797","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Seventh International Symposium on Visualization for Cyber Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":57,"referenced_works":["https://openalex.org/W82430309","https://openalex.org/W177666592","https://openalex.org/W1278625838","https://openalex.org/W1488676795","https://openalex.org/W1493911800","https://openalex.org/W1494756088","https://openalex.org/W1495304983","https://openalex.org/W1545276251","https://openalex.org/W1549716092","https://openalex.org/W1549767874","https://openalex.org/W1551475640","https://openalex.org/W1561104315","https://openalex.org/W1575994098","https://openalex.org/W1590566921","https://openalex.org/W1594026167","https://openalex.org/W1744212210","https://openalex.org/W1970184956","https://openalex.org/W1982500521","https://openalex.org/W1993152411","https://openalex.org/W1994484049","https://openalex.org/W1999058284","https://openalex.org/W1999705655","https://openalex.org/W2010326631","https://openalex.org/W2018246367","https://openalex.org/W2033483979","https://openalex.org/W2042044826","https://openalex.org/W2044128534","https://openalex.org/W2055416592","https://openalex.org/W2063329049","https://openalex.org/W2063863347","https://openalex.org/W2088674034","https://openalex.org/W2100060516","https://openalex.org/W2108867737","https://openalex.org/W2109662977","https://openalex.org/W2111726016","https://openalex.org/W2117807052","https://openalex.org/W2121266538","https://openalex.org/W2121805588","https://openalex.org/W2123919789","https://openalex.org/W2124204971","https://openalex.org/W2130598833","https://openalex.org/W2131880356","https://openalex.org/W2141200504","https://openalex.org/W2147872867","https://openalex.org/W2150368284","https://openalex.org/W2152449272","https://openalex.org/W2153463096","https://openalex.org/W2158263776","https://openalex.org/W2160858448","https://openalex.org/W2161304134","https://openalex.org/W2162514427","https://openalex.org/W2163277533","https://openalex.org/W2169691657","https://openalex.org/W2912062511","https://openalex.org/W2915925638","https://openalex.org/W4285719527","https://openalex.org/W6607285251"],"related_works":["https://openalex.org/W2133389611","https://openalex.org/W2061466315","https://openalex.org/W2376886931","https://openalex.org/W2010561419","https://openalex.org/W2374845301","https://openalex.org/W2351448539","https://openalex.org/W1977863481","https://openalex.org/W2384741105","https://openalex.org/W3157271777","https://openalex.org/W2377372927"],"abstract_inverted_index":{"Network":[0],"Intrusion":[1],"Detection":[2],"is":[3,22,31,51],"a":[4,23,32,93],"critical":[5],"task":[6],"in":[7,36,55],"today's":[8],"environment,":[9],"where":[10,47],"network":[11,100],"attacks":[12],"and":[13,18,53,82,108],"intrusions":[14],"are":[15],"everyday":[16],"occurrences":[17],"state-level":[19],"cyber":[20],"warfare":[21],"major":[24],"concern.":[25],"At":[26],"the":[27,40,44,48,59,67,76],"same":[28],"time,":[29],"it":[30],"very":[33],"difficult":[34],"task,":[35],"part":[37,56],"due":[38],"to":[39],"large":[41],"scale":[42],"of":[43,58,61,79],"data":[45,63],"logs":[46],"attack":[49],"information":[50],"hidden,":[52],"also":[54],"because":[57],"lack":[60],"effective":[62],"exploration":[64],"tools":[65],"for":[66,96,99,111],"intrusion":[68],"detection":[69],"tasks.":[70],"In":[71],"this":[72,89],"work,":[73],"we":[74,91],"examine":[75],"current":[77],"state":[78],"visualization":[80],"techniques":[81],"identify":[83],"some":[84],"key":[85],"limitations.":[86],"Based":[87],"on":[88,104],"analysis,":[90],"propose":[92],"novel":[94],"design":[95],"an":[97],"interface":[98],"security":[101],"analysts,":[102],"capitalizing":[103],"cutting":[105],"edge":[106],"technology,":[107],"discuss":[109],"implications":[110],"future":[112],"research.":[113]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":4},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
