{"id":"https://openalex.org/W1990985473","doi":"https://doi.org/10.1145/1850795.1850801","title":"PeekKernelFlows","display_name":"PeekKernelFlows","publication_year":2010,"publication_date":"2010-09-02","ids":{"openalex":"https://openalex.org/W1990985473","doi":"https://doi.org/10.1145/1850795.1850801","mag":"1990985473"},"language":"en","primary_location":{"id":"doi:10.1145/1850795.1850801","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1850795.1850801","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Seventh International Symposium on Visualization for Cyber Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083177381","display_name":"Cynthia Wagner","orcid":null},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":true,"raw_author_name":"Cynthia Wagner","raw_affiliation_strings":["University of Luxembourg, Luxembourg"],"affiliations":[{"raw_affiliation_string":"University of Luxembourg, Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066429213","display_name":"G\u00e9rard Wagener","orcid":null},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"G\u00e9rard Wagener","raw_affiliation_strings":["University of Luxembourg - SNT, Luxembourg","University of Luxembourg - SNT, Luxembourg#TAB#"],"affiliations":[{"raw_affiliation_string":"University of Luxembourg - SNT, Luxembourg","institution_ids":["https://openalex.org/I186903577"]},{"raw_affiliation_string":"University of Luxembourg - SNT, Luxembourg#TAB#","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069228908","display_name":"Radu State","orcid":"https://orcid.org/0000-0002-4751-9577"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Radu State","raw_affiliation_strings":["University of Luxembourg, Luxembourg"],"affiliations":[{"raw_affiliation_string":"University of Luxembourg, Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016095795","display_name":"Alexandre Dulaunoy","orcid":"https://orcid.org/0000-0002-5437-4652"},"institutions":[{"id":"https://openalex.org/I909555","display_name":"SES (Luxembourg)","ror":"https://ror.org/00526y629","country_code":"LU","type":"company","lineage":["https://openalex.org/I909555"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Alexandre Dulaunoy","raw_affiliation_strings":["SES S.A., Ch\u00e2teau de Betzdorf, Betzdorf, Luxembourg"],"affiliations":[{"raw_affiliation_string":"SES S.A., Ch\u00e2teau de Betzdorf, Betzdorf, Luxembourg","institution_ids":["https://openalex.org/I909555"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009071576","display_name":"Thomas Engel","orcid":"https://orcid.org/0000-0002-7374-3927"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Thomas Engel","raw_affiliation_strings":["University of Luxembourg, Luxembourg"],"affiliations":[{"raw_affiliation_string":"University of Luxembourg, Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5083177381"],"corresponding_institution_ids":["https://openalex.org/I186903577"],"apc_list":null,"apc_paid":null,"fwci":1.4245,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.81570493,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"52","last_page":"57"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8523772954940796},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.7555732131004333},{"id":"https://openalex.org/keywords/kernel","display_name":"Kernel (algebra)","score":0.5642380118370056},{"id":"https://openalex.org/keywords/data-visualization","display_name":"Data visualization","score":0.4862765073776245},{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.4840228259563446},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4451929032802582},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.17241773009300232}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8523772954940796},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.7555732131004333},{"id":"https://openalex.org/C74193536","wikidata":"https://www.wikidata.org/wiki/Q574844","display_name":"Kernel (algebra)","level":2,"score":0.5642380118370056},{"id":"https://openalex.org/C172367668","wikidata":"https://www.wikidata.org/wiki/Q6504956","display_name":"Data visualization","level":3,"score":0.4862765073776245},{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.4840228259563446},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4451929032802582},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.17241773009300232},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1850795.1850801","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1850795.1850801","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Seventh International Symposium on Visualization for Cyber Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1517527854","https://openalex.org/W1563250780","https://openalex.org/W1572300867","https://openalex.org/W1679913846","https://openalex.org/W2055416592","https://openalex.org/W2108138195","https://openalex.org/W2143982302","https://openalex.org/W2144006900","https://openalex.org/W2148603752","https://openalex.org/W2542318691","https://openalex.org/W2554888723","https://openalex.org/W4245176872","https://openalex.org/W4246719038","https://openalex.org/W4253893210"],"related_works":["https://openalex.org/W2013728941","https://openalex.org/W4225274103","https://openalex.org/W2579659702","https://openalex.org/W2154046714","https://openalex.org/W1965329638","https://openalex.org/W2189613078","https://openalex.org/W2923661510","https://openalex.org/W1574055964","https://openalex.org/W2542318691","https://openalex.org/W3160708108"],"abstract_inverted_index":{"This":[0,32,42],"paper":[1],"introduces":[2],"a":[3,16,37,51,69,78],"new":[4],"method":[5,67],"for":[6],"getting":[7],"insights":[8],"into":[9],"IP":[10,30],"related":[11],"data":[12],"flows":[13],"based":[14],"on":[15,68],"simple":[17],"visualization":[18,38],"technique":[19],"that":[20],"leverages":[21],"kernel":[22],"functions":[23],"defined":[24],"over":[25,50],"spatial":[26],"and":[27],"temporal":[28],"aggregated":[29],"flows.":[31],"approach":[33],"was":[34],"implemented":[35],"in":[36],"tool":[39,43],"called":[40],"PeekKernelFlows.":[41],"simplifies":[44],"the":[45],"identification":[46],"of":[47,77],"anomalous":[48],"patterns":[49],"time":[52],"period.":[53],"An":[54],"intuitive":[55],"adapting":[56],"image":[57],"allows":[58],"network":[59],"operators":[60],"to":[61],"detect":[62],"attacks.":[63],"We":[64],"validated":[65],"our":[66],"real":[70],"use-case":[71],"scenario,":[72],"where":[73],"we":[74],"inspected":[75],"traffic":[76],"high-interaction":[79],"honeypot.":[80]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
