{"id":"https://openalex.org/W2016206946","doi":"https://doi.org/10.1145/1850795.1850806","title":"Interactive detection of network anomalies via coordinated multiple views","display_name":"Interactive detection of network anomalies via coordinated multiple views","publication_year":2010,"publication_date":"2010-09-02","ids":{"openalex":"https://openalex.org/W2016206946","doi":"https://doi.org/10.1145/1850795.1850806","mag":"2016206946"},"language":"en","primary_location":{"id":"doi:10.1145/1850795.1850806","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1850795.1850806","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Seventh International Symposium on Visualization for Cyber Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087146581","display_name":"Lane Harrison","orcid":"https://orcid.org/0000-0003-3029-2799"},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Lane Harrison","raw_affiliation_strings":["University of North Carolina at Charlotte, Charlotte, NC"],"affiliations":[{"raw_affiliation_string":"University of North Carolina at Charlotte, Charlotte, NC","institution_ids":["https://openalex.org/I102149020"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052788012","display_name":"Xianlin Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xianlin Hu","raw_affiliation_strings":["University of North Carolina at Charlotte, Charlotte, NC"],"affiliations":[{"raw_affiliation_string":"University of North Carolina at Charlotte, Charlotte, NC","institution_ids":["https://openalex.org/I102149020"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013933037","display_name":"Xiaowei Ying","orcid":null},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaowei Ying","raw_affiliation_strings":["University of North Carolina at Charlotte, Charlotte, NC"],"affiliations":[{"raw_affiliation_string":"University of North Carolina at Charlotte, Charlotte, NC","institution_ids":["https://openalex.org/I102149020"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015271163","display_name":"Aidong Lu","orcid":"https://orcid.org/0000-0002-7684-4512"},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Aidong Lu","raw_affiliation_strings":["University of North Carolina at Charlotte, Charlotte, NC"],"affiliations":[{"raw_affiliation_string":"University of North Carolina at Charlotte, Charlotte, NC","institution_ids":["https://openalex.org/I102149020"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100757933","display_name":"Weichao Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Weichao Wang","raw_affiliation_strings":["University of North Carolina at Charlotte, Charlotte, NC"],"affiliations":[{"raw_affiliation_string":"University of North Carolina at Charlotte, Charlotte, NC","institution_ids":["https://openalex.org/I102149020"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008463509","display_name":"Xintao Wu","orcid":"https://orcid.org/0000-0002-2823-3063"},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xintao Wu","raw_affiliation_strings":["University of North Carolina at Charlotte, Charlotte, NC"],"affiliations":[{"raw_affiliation_string":"University of North Carolina at Charlotte, Charlotte, NC","institution_ids":["https://openalex.org/I102149020"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5087146581"],"corresponding_institution_ids":["https://openalex.org/I102149020"],"apc_list":null,"apc_paid":null,"fwci":0.3719,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.63573741,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"91","last_page":"101"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8204420804977417},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7424207925796509},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.6107509732246399},{"id":"https://openalex.org/keywords/histogram","display_name":"Histogram","score":0.5954245328903198},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5719669461250305},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5521320104598999},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5445057153701782},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5106826424598694},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4422699809074402},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3896549344062805},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.32168635725975037},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.1619279682636261}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8204420804977417},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7424207925796509},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.6107509732246399},{"id":"https://openalex.org/C53533937","wikidata":"https://www.wikidata.org/wiki/Q185020","display_name":"Histogram","level":3,"score":0.5954245328903198},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5719669461250305},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5521320104598999},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5445057153701782},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5106826424598694},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4422699809074402},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3896549344062805},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.32168635725975037},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.1619279682636261},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1145/1850795.1850806","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1850795.1850806","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Seventh International Symposium on Visualization for Cyber Security","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.649.5779","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.649.5779","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://viscenter.uncc.edu/sites/viscenter.uncc.edu/files/CVC-UNCC-11-25.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.703.50","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.703.50","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://webpages.uncc.edu/wwang22/Research/papers/VizSec-10-Wang.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.703.8236","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.703.8236","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://web.cs.wpi.edu/%7Eltharrison/files/harrison2010interactive.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2045416905","display_name":null,"funder_award_id":"7.55E+19","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G2598573980","display_name":null,"funder_award_id":"DE-FG02-06ER25733","funder_id":"https://openalex.org/F4320306084","funder_display_name":"U.S. Department of Energy"},{"id":"https://openalex.org/G8822969504","display_name":null,"funder_award_id":"2008-ST-104-000017","funder_id":"https://openalex.org/F4320306110","funder_display_name":"U.S. Department of Homeland Security"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320306084","display_name":"U.S. Department of Energy","ror":"https://ror.org/01bj3aw27"},{"id":"https://openalex.org/F4320306110","display_name":"U.S. Department of Homeland Security","ror":"https://ror.org/00jyr0d86"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W20667085","https://openalex.org/W63421287","https://openalex.org/W105330602","https://openalex.org/W1520914943","https://openalex.org/W1533657962","https://openalex.org/W1551333318","https://openalex.org/W1575994098","https://openalex.org/W1940397557","https://openalex.org/W1965332127","https://openalex.org/W1983138649","https://openalex.org/W1990851127","https://openalex.org/W2017018978","https://openalex.org/W2025598241","https://openalex.org/W2045012623","https://openalex.org/W2076653827","https://openalex.org/W2080807290","https://openalex.org/W2089468765","https://openalex.org/W2098608071","https://openalex.org/W2106588364","https://openalex.org/W2123736108","https://openalex.org/W2128712108","https://openalex.org/W2134511994","https://openalex.org/W2147510259","https://openalex.org/W2150925050","https://openalex.org/W2151530263","https://openalex.org/W2154699792","https://openalex.org/W2155899844","https://openalex.org/W2159126760","https://openalex.org/W2165491783","https://openalex.org/W2915054978","https://openalex.org/W3146199030","https://openalex.org/W4210491746","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2068608913","https://openalex.org/W3124914020","https://openalex.org/W2141033859","https://openalex.org/W2077542787","https://openalex.org/W2107628111","https://openalex.org/W2156434174","https://openalex.org/W2357468538","https://openalex.org/W2071701083","https://openalex.org/W2383687187","https://openalex.org/W4367857133"],"abstract_inverted_index":{"This":[0],"paper":[1],"presents":[2],"a":[3,31,128],"new":[4],"approach":[5,143,161],"to":[6,67,82,90,148,165,172],"intrusion":[7,122],"detection":[8,123,167],"that":[9,40,71,121,159],"supports":[10],"the":[11,59,84,110,114,139],"identification":[12,73],"and":[13,35,118,144,152,175],"analysis":[14,43,63],"of":[15,30,74,131,141],"network":[16,49],"anomalies":[17,50],"using":[18],"an":[19],"interactive":[20,42],"coordinated":[21],"multiple":[22],"views":[23],"(CMV)":[24],"mechanism.":[25],"A":[26],"CMV":[27,132],"visualization":[28],"consisting":[29],"node-link":[32],"diagram,":[33],"scatterplot,":[34],"time":[36,85,92],"histogram":[37],"is":[38,80,107],"described":[39],"allows":[41,88],"from":[44,100],"different":[45],"perspectives,":[46],"as":[47,109],"some":[48],"can":[51,124,162],"only":[52],"be":[53,125,163],"identified":[54],"through":[55],"joint":[56],"features":[57],"in":[58,94,103,168],"provided":[60],"spaces.":[61],"Spectral":[62],"methods":[64],"are":[65,136,146],"integrated":[66],"provide":[68],"visual":[69],"cues":[70],"allow":[72],"malicious":[75],"nodes.":[76],"An":[77],"adjacency-based":[78],"method":[79],"developed":[81],"generate":[83],"histogram,":[86],"which":[87,95],"users":[89],"select":[91],"ranges":[93],"suspicious":[96],"activity":[97],"occurs.":[98],"Data":[99],"Sybil":[101],"attacks":[102],"simulated":[104],"wireless":[105],"networks":[106,174],"used":[108],"test":[111],"bed":[112],"for":[113],"system.":[115],"The":[116],"results":[117,135],"discussions":[119],"demonstrate":[120],"achieved":[126],"with":[127],"few":[129],"iterations":[130],"exploration.":[133],"Quantitative":[134],"collected":[137],"on":[138],"accuracy":[140],"our":[142],"comparisons":[145],"made":[147],"single":[149],"domain":[150],"exploration":[151],"other":[153],"high-dimensional":[154],"projection":[155],"methods.":[156],"We":[157],"believe":[158],"this":[160],"extended":[164],"anomaly":[166],"general":[169],"networks,":[170],"particularly":[171],"Internet":[173],"social":[176],"networks.":[177]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":4}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
