A survey on information visualization for network and service management
Network and service management encompasses a set of activities, methods, procedures,
and tools, whose ultimate goal is to guarantee the proper functioning of a networked system …
and tools, whose ultimate goal is to guarantee the proper functioning of a networked system …
Intelligent visualization and exploration of time-oriented data of multiple patients
OBJECTIVE: Clinicians and medical researchers alike require useful, intuitive, and
intelligent tools to process large amounts of time-oriented multiple-patient data from multiple …
intelligent tools to process large amounts of time-oriented multiple-patient data from multiple …
[HTML][HTML] VisualDecisionLinc: A visual analytics approach for comparative effectiveness-based clinical decision support in psychiatry
Comparative Effectiveness Research (CER) is designed to provide research evidence on
the effectiveness and risks of different therapeutic options on the basis of data compiled from …
the effectiveness and risks of different therapeutic options on the basis of data compiled from …
Near-miss situation based visual analysis of SIEM rules for real time network security monitoring
Security information and event management (SIEM) systems are generally used to monitor
the network for malicious activities. These systems are capable of detecting a wide range of …
the network for malicious activities. These systems are capable of detecting a wide range of …
Problem characterization and abstraction for visual analytics in behavior-based malware pattern analysis
Behavior-based analysis of emerging malware families involves finding suspicious patterns
in large collections of execution traces. This activity cannot be automated for previously …
in large collections of execution traces. This activity cannot be automated for previously …
Intelligent selection and retrieval of multiple time-oriented records
Time-oriented domains with large volumes of time-stamped information, such as medicine,
security information and finance, require useful, intuitive intelligent tools to process large …
security information and finance, require useful, intuitive intelligent tools to process large …
Effective SQL injection attack reconstruction using network recording
A Pomeroy, Q Tan - 2011 IEEE 11th International Conference …, 2011 - ieeexplore.ieee.org
Web applications offer business and convenience services that society has become
dependent on, such as online banking. Success of these applications is dependent on end …
dependent on, such as online banking. Success of these applications is dependent on end …
Implementation and evaluation of a multivariate abstraction-based, interval-based dynamic time-war** method as a similarity measure for longitudinal medical …
M Lion, Y Shahar - Journal of Biomedical Informatics, 2021 - Elsevier
Objectives A common prerequisite for tasks such as classification, prediction, clustering and
retrieval of longitudinal medical records is a clinically meaningful similarity measure that …
retrieval of longitudinal medical records is a clinically meaningful similarity measure that …
Multistage attack detection system for network administrators using data mining
R Katipally, W Gasior, X Cui, L Yang - … of the Sixth Annual Workshop on …, 2010 - dl.acm.org
In this paper, we present a method to discover, visualize, and predict behavior pattern of
attackers in a network based system. We proposed a system that is able to discover …
attackers in a network based system. We proposed a system that is able to discover …
Using the KBTA method for inferring computer and network security alerts from time-stamped, raw system metrics
In this study, we propose a new approach for detecting previously unencountered instances
of known classes of malicious software based on their temporal behavior. In the proposed …
of known classes of malicious software based on their temporal behavior. In the proposed …