Toggle navigation
  • Getting started
  • Search
  • Topics
  • About
Search for VIS paper keywords

New keyword search:

network security
found in
5
papers
co-occured with
16
author keywords
in a topic cluster with
17
author keywords

network security found in 5 VIS Papers

Conf. Year ▴ Title
VAST 2008 Model-driven Visual Analytics
Link to IEEE
Keywords: visual analytics
high-dimensional data
knowledge discovery
machine learning
network security
visual clustering
grand tour
InfoVis 2007 Visual Analysis of Network Traffic for Resource Planning, Interactive Monitoring, and Interpretation of Security Threats
Link to IEEE
Keywords: information visualization
treemap
network security
network monitoring
VAST 2007 SpiralView: Towards Security Policies Assessment through Visual Correlation of Network Resources with Evolution of Alarms
Link to IEEE
Keywords: visualization
data exploration
network security
intrusion detection
VAST 2006 Accelerating Network Traffic Analytics Using Query-Driven Visualization
Link to IEEE
Keywords: visual analytics
data mining
network security
query-driven visualization
Vis 2002 Case study: Interactive visualization for Internet security
Link to IEEE
Keywords: information visualization
graph drawing
anomaly detection
network security

network security co-occurs with 16 other keywords:

information visualization 2x visual analytics 2x anomaly detection 1x data exploration 1x data mining 1x grand tour 1x graph drawing 1x high-dimensional data 1x intrusion detection 1x knowledge discovery 1x machine learning 1x network monitoring 1x query-driven visualization 1x treemap 1x visual clustering 1x visualization 1x


network security is part of the topic cluster Computer Networks & Network Security containing 17 keywords
network security 5x network traffic visualization 2x concurrent visualization 1x error-based frame control 1x interdomain routing 1x intrusion detection 1x network diagnosis 1x network intrusion 1x network latency 1x network monitoring 1x network security and intrusion 1x network traffic monitoring 1x p2p file-sharing networks visualization 1x server log analysis 1x visualization on network security 1x wireless networks 1x wormhole attacks 1x
  • Petra Isenberg
  • Tobias Isenberg
  • Michael Sedlmair
  • Jian Chen
  • Torsten Möller
Design and Layout: Nenad Kircanski & Johanna Schlereth