A survey on information visualization for network and service management

VT Guimaraes, CMDS Freitas, R Sadre… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Network and service management encompasses a set of activities, methods, procedures,
and tools, whose ultimate goal is to guarantee the proper functioning of a networked system …

Intelligent visualization and exploration of time-oriented data of multiple patients

D Klimov, Y Shahar, M Taieb-Maimon - Artificial intelligence in medicine, 2010 - Elsevier
OBJECTIVE: Clinicians and medical researchers alike require useful, intuitive, and
intelligent tools to process large amounts of time-oriented multiple-patient data from multiple …

[HTML][HTML] VisualDecisionLinc: A visual analytics approach for comparative effectiveness-based clinical decision support in psychiatry

KK Mane, C Bizon, C Schmitt, P Owen… - Journal of Biomedical …, 2012 - Elsevier
Comparative Effectiveness Research (CER) is designed to provide research evidence on
the effectiveness and risks of different therapeutic options on the basis of data compiled from …

Near-miss situation based visual analysis of SIEM rules for real time network security monitoring

A Majeed, R ur Rasool, F Ahmad, M Alam… - Journal of Ambient …, 2019 - Springer
Security information and event management (SIEM) systems are generally used to monitor
the network for malicious activities. These systems are capable of detecting a wide range of …

Problem characterization and abstraction for visual analytics in behavior-based malware pattern analysis

M Wagner, W Aigner, A Rind, H Dornhackl… - Proceedings of the …, 2014 - dl.acm.org
Behavior-based analysis of emerging malware families involves finding suspicious patterns
in large collections of execution traces. This activity cannot be automated for previously …

Intelligent selection and retrieval of multiple time-oriented records

D Klimov, Y Shahar, M Taieb-Maimon - Journal of Intelligent Information …, 2010 - Springer
Time-oriented domains with large volumes of time-stamped information, such as medicine,
security information and finance, require useful, intuitive intelligent tools to process large …

Effective SQL injection attack reconstruction using network recording

A Pomeroy, Q Tan - 2011 IEEE 11th International Conference …, 2011 - ieeexplore.ieee.org
Web applications offer business and convenience services that society has become
dependent on, such as online banking. Success of these applications is dependent on end …

Implementation and evaluation of a multivariate abstraction-based, interval-based dynamic time-war** method as a similarity measure for longitudinal medical …

M Lion, Y Shahar - Journal of Biomedical Informatics, 2021 - Elsevier
Objectives A common prerequisite for tasks such as classification, prediction, clustering and
retrieval of longitudinal medical records is a clinically meaningful similarity measure that …

Multistage attack detection system for network administrators using data mining

R Katipally, W Gasior, X Cui, L Yang - … of the Sixth Annual Workshop on …, 2010 - dl.acm.org
In this paper, we present a method to discover, visualize, and predict behavior pattern of
attackers in a network based system. We proposed a system that is able to discover …

Using the KBTA method for inferring computer and network security alerts from time-stamped, raw system metrics

A Shabtai, Y Fledel, Y Elovici, Y Shahar - Journal in computer virology, 2010 - Springer
In this study, we propose a new approach for detecting previously unencountered instances
of known classes of malicious software based on their temporal behavior. In the proposed …