{"id":"https://openalex.org/W2118145999","doi":"https://doi.org/10.5539/cis.v3n4p240","title":"Using Visual Analytics to Develop Situation Awareness in Network Intrusion Detection System","display_name":"Using Visual Analytics to Develop Situation Awareness in Network Intrusion Detection System","publication_year":2010,"publication_date":"2010-10-20","ids":{"openalex":"https://openalex.org/W2118145999","doi":"https://doi.org/10.5539/cis.v3n4p240","mag":"2118145999"},"language":"en","primary_location":{"id":"doi:10.5539/cis.v3n4p240","is_oa":true,"landing_page_url":"https://doi.org/10.5539/cis.v3n4p240","pdf_url":"https://ccsenet.org/journal/index.php/cis/article/download/6769/6139","source":{"id":"https://openalex.org/S2764452479","display_name":"Computer and Information Science","issn_l":"1913-8989","issn":["1913-8989","1913-8997"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310322531","host_organization_name":"Canadian Center of Science and Education","host_organization_lineage":["https://openalex.org/P4310322531"],"host_organization_lineage_names":["Canadian Center of Science and Education"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer and Information Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://ccsenet.org/journal/index.php/cis/article/download/6769/6139","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083571530","display_name":"Olusegun Folorunso","orcid":"https://orcid.org/0000-0002-9897-7375"},"institutions":[{"id":"https://openalex.org/I18045400","display_name":"Federal University of Agriculture","ror":"https://ror.org/050s1zm26","country_code":"NG","type":"education","lineage":["https://openalex.org/I18045400"]}],"countries":["NG"],"is_corresponding":true,"raw_author_name":"Olusegun Folorunso","raw_affiliation_strings":["Department of Computer Science University of Agriculture Abeokuta, Ogun State, Nigeria","Department of Computer Science, University of Agriculture Abeokuta"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science University of Agriculture Abeokuta, Ogun State, Nigeria","institution_ids":["https://openalex.org/I18045400"]},{"raw_affiliation_string":"Department of Computer Science, University of Agriculture Abeokuta","institution_ids":["https://openalex.org/I18045400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111382545","display_name":"A. T. Akinwale","orcid":null},"institutions":[{"id":"https://openalex.org/I18045400","display_name":"Federal University of Agriculture","ror":"https://ror.org/050s1zm26","country_code":"NG","type":"education","lineage":["https://openalex.org/I18045400"]}],"countries":["NG"],"is_corresponding":false,"raw_author_name":"Adio Taofiki Akinwale","raw_affiliation_strings":["Department of Computer Science University of Agriculture Abeokuta, Ogun State, Nigeria","Department of Computer Science, University of Agriculture Abeokuta"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science University of Agriculture Abeokuta, Ogun State, Nigeria","institution_ids":["https://openalex.org/I18045400"]},{"raw_affiliation_string":"Department of Computer Science, University of Agriculture Abeokuta","institution_ids":["https://openalex.org/I18045400"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048655554","display_name":"Aderonke J. Ikuomola","orcid":null},"institutions":[{"id":"https://openalex.org/I18045400","display_name":"Federal University of Agriculture","ror":"https://ror.org/050s1zm26","country_code":"NG","type":"education","lineage":["https://openalex.org/I18045400"]}],"countries":["NG"],"is_corresponding":false,"raw_author_name":"Aderonke J Ikuomola","raw_affiliation_strings":["Department of Computer Science, University of Agriculture Abeokuta"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Agriculture Abeokuta","institution_ids":["https://openalex.org/I18045400"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5083571530"],"corresponding_institution_ids":["https://openalex.org/I18045400"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.14123673,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"3","issue":"4","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10799","display_name":"Data Visualization and Analytics","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8780760765075684},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7819106578826904},{"id":"https://openalex.org/keywords/visual-analytics","display_name":"Visual analytics","score":0.5674680471420288},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.5441819429397583},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.5320212841033936},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.5159962177276611},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47252708673477173},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.46901482343673706},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.46740442514419556},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.2908508777618408},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.20149052143096924},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.1719340980052948}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8780760765075684},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7819106578826904},{"id":"https://openalex.org/C59732488","wikidata":"https://www.wikidata.org/wiki/Q2528440","display_name":"Visual analytics","level":3,"score":0.5674680471420288},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.5441819429397583},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.5320212841033936},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.5159962177276611},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47252708673477173},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.46901482343673706},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.46740442514419556},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.2908508777618408},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.20149052143096924},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.1719340980052948},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.5539/cis.v3n4p240","is_oa":true,"landing_page_url":"https://doi.org/10.5539/cis.v3n4p240","pdf_url":"https://ccsenet.org/journal/index.php/cis/article/download/6769/6139","source":{"id":"https://openalex.org/S2764452479","display_name":"Computer and Information Science","issn_l":"1913-8989","issn":["1913-8989","1913-8997"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310322531","host_organization_name":"Canadian Center of Science and Education","host_organization_lineage":["https://openalex.org/P4310322531"],"host_organization_lineage_names":["Canadian Center of Science and Education"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer and Information Science","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.910.4262","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.910.4262","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://ccsenet.org/journal/index.php/cis/article/download/6769/6139/","raw_type":"text"}],"best_oa_location":{"id":"doi:10.5539/cis.v3n4p240","is_oa":true,"landing_page_url":"https://doi.org/10.5539/cis.v3n4p240","pdf_url":"https://ccsenet.org/journal/index.php/cis/article/download/6769/6139","source":{"id":"https://openalex.org/S2764452479","display_name":"Computer and Information Science","issn_l":"1913-8989","issn":["1913-8989","1913-8997"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310322531","host_organization_name":"Canadian Center of Science and Education","host_organization_lineage":["https://openalex.org/P4310322531"],"host_organization_lineage_names":["Canadian Center of Science and Education"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer and Information Science","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.4300000071525574}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2118145999.pdf","grobid_xml":"https://content.openalex.org/works/W2118145999.grobid-xml"},"referenced_works_count":32,"referenced_works":["https://openalex.org/W7809006","https://openalex.org/W68930173","https://openalex.org/W178964424","https://openalex.org/W206495011","https://openalex.org/W1480347468","https://openalex.org/W1499183562","https://openalex.org/W1515452738","https://openalex.org/W1516293359","https://openalex.org/W1541939527","https://openalex.org/W1576234442","https://openalex.org/W1581995660","https://openalex.org/W1602380388","https://openalex.org/W1992820542","https://openalex.org/W1993152411","https://openalex.org/W1999058284","https://openalex.org/W2044128534","https://openalex.org/W2059071790","https://openalex.org/W2105422995","https://openalex.org/W2108867737","https://openalex.org/W2110017066","https://openalex.org/W2112709201","https://openalex.org/W2140005134","https://openalex.org/W2141200504","https://openalex.org/W2145262290","https://openalex.org/W2146948159","https://openalex.org/W2148269024","https://openalex.org/W2158263776","https://openalex.org/W2608724236","https://openalex.org/W3214373139","https://openalex.org/W4239895564","https://openalex.org/W4285719527","https://openalex.org/W6608422190"],"related_works":["https://openalex.org/W4210310791","https://openalex.org/W2062940763","https://openalex.org/W2061466315","https://openalex.org/W2376886931","https://openalex.org/W2937343495","https://openalex.org/W2010561419","https://openalex.org/W4360833258","https://openalex.org/W2374845301","https://openalex.org/W2351448539","https://openalex.org/W1977863481"],"abstract_inverted_index":{"Network":[0,93],"Intrusion":[1,94],"Detection":[2,95],"System":[3,96],"(NIDS)":[4],"is":[5,40],"a":[6,71,86],"security":[7,31,48,117],"system":[8,43,83,112],"that":[9],"monitors":[10],"the":[11,35,100,110,116,120],"network":[12,36,111],"traffic":[13],"and":[14,60,64,68,153,161],"analyzes":[15],"activities":[16],"for":[17,27,46],"possible":[18],"hostile":[19],"attacks.":[20],"A":[21],"novel":[22],"collaborative":[23],"visual":[24],"analytics":[25],"application":[26],"cognitive":[28],"overloaded":[29],"site":[30,47],"officer":[32],"(SSO)":[33],"in":[34,119],"intrusion":[37,56,75],"detection":[38],"environment":[39],"presented.":[41],"The":[42,91,103,129],"was":[44,79,97],"developed":[45],"officers":[49],"who":[50],"need":[51],"to":[52,141],"analyze":[53],"heterogeneous,":[54],"complex":[55],"under":[57,70],"time":[58],"pressure,":[59],"then":[61],"make":[62],"predictions":[63],"time-critical":[65],"decisions":[66],"rapidly":[67],"correctly":[69],"constant":[72],"influx":[73],"of":[74,85,105,109,122,126,150],"alert/alarm.":[76],"This":[77],"purpose":[78],"achieved":[80],"by":[81,115,137],"designing":[82],"architecture":[84],"Treemaps":[87,92],"Visualization":[88],"on":[89],"NIDs.":[90],"implemented":[98],"using":[99],"Java":[101],"platform.":[102],"results":[104],"an":[106],"informal":[107],"usability":[108],"were":[113],"evaluated":[114],"experts":[118],"context":[121],"Endley\u2019s":[123],"three":[124],"levels":[125],"situation":[127],"awareness.":[128],"proposed":[130],"visualization":[131],"tool":[132],"has":[133],"some":[134],"economic":[135],"advantages":[136],"aiding":[138],"NID\u2019s":[139],"SSO":[140],"dynamically":[142],"discover":[143],"intrusive":[144],"zone":[145],"which":[146],"will":[147],"reduce":[148],"cost":[149],"manual":[151],"analysis":[152],"high":[154],"risks,":[155],"efficient":[156],"space":[157],"utilization,":[158],"interactivity,":[159],"comprehension":[160],"esthetics.":[162]},"counts_by_year":[{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
