Chinese Journal of Network and Information Security ›› 2018, Vol. 4 ›› Issue (2): 1-17.doi: 10.11959/j.issn.2096-109x.2018014
• Security data visualization • Next Articles
Song WANG1,2,Ye ZHANG1,Yadong WU1
Revised:
2018-02-04
Online:
2018-02-15
Published:
2018-03-08
Supported by:
CLC Number:
Song WANG, Ye ZHANG, Yadong WU. Survey on network topology visualization[J]. Chinese Journal of Network and Information Security, 2018, 4(2): 1-17.
[1] | ROHRER R , SWING E . Web-based information visualization[C]// IEEE Computer Graphics and Applications. 1997: 52-59. |
[2] | 王宇晓 . 大规模网络拓扑可视化研究[D]. 北京:北京理工大学, 2016. |
WANG X Y . Research on large-scale network topology visualization[D]. Beijing:Beijing Institute of Technology, 2016. | |
[3] | 张伟明, 罗军勇, 王清贤 . 网络拓扑可视化研究综述[J]. 计算机应用研究, 2008,25(6): 1606-1610. |
ZHANG W M , LUO J Y , WANG Q X . Survey on network topology visualization[J]. Application Research of Computers, 2008,25(6): 1606-1610. | |
[4] | GRAHAM J W . Nicheworks-interactive visualization of very large graphs[J]. Journal of Computational and Graphical Statistics, 1999,8(2): 190-212. |
[5] | SUGIYAMA K , TAGAWA S , TODA M . Methods for visual understanding of hierarchical systems[J]. IEEE Transactions on Sys-tems Man & Cybermetics, 1981,11(2): 109-125. |
[6] | AU S C , LECKIE C , PARHAR A ,et al. Efficient visualization of large routing topologies[J]. International Journal of Network Management, 2004,14(2): 105-118. |
[7] | 何鹏, 陆建新, 施佺 ,等. 一种园区级网络拓扑图布局算法[J]. 微计算机信息, 2007,23(3): 143-145. |
HE P , LU J , SHI Q ,et al. A campus scale network map layout algorithm[J]. Microcomputer Information, 2007,23(3): 143-145. | |
[8] | WARE C , PURCHASE H , COLPOYS L ,et al. Cognitive measurements of graph aesthetics[J]. Information Visualization, 2002,1(2): 103-110. |
[9] | CHATURVEDI S , DUNNE C , ASHKTORAB Z ,et al. Groupin-a-box meta-layouts for topological clusters and attribute-based groups:space-efficient visualizations of network communities and their ties[J]. Computer Graphics Forum, 2014,33(8): 52-68. |
[10] | YOGHOURDJIAN V , DWYER T , GANGE G ,et al. High-quality ultra-compact grid layout of grouped networks[J]. IEEE Transactions on Visualization and Computer Graphics, 2016,22(1): 339-348. |
[11] | WU Y , WU W , YANG S ,et al. Interactive visual summary of major communities in a large network[C]// IEEE Pacific Visualization Symposium, 2015: 47-54. |
[12] | CUI W , ZHOU H , QU H ,et al. Geometry-based edge clustering for graph visualization[J]. IEEE Transactions on Visualization and Computer Graphics, 2008,14(6): 1277-1284. |
[13] | PENG D , LU N , CHEN W ,et al. SideKnot:revealing relation pat-terns for graph visualization[C]// IEEE Pacific Visualization Symposium. 2012: 65-72. |
[14] | HURTER C , ERSOY O , TELEA A . Graph bundling by kernel density estimation[J]. Computer Graphics Forum, 2012,31(3): 435-443. |
[15] | PEYSAKHOVICH V , HURTER C , TELEA A . Attribute-driven edge bundling for general graphs with applications in trail analysis[C]// IEEE Pacific Visualization Symposium. 2015: 39-46. |
[16] | BACH B , RICHE N H , HURTER C ,et al. Towards unambiguous edge bundling:investigating confluent drawings for network visualization[J]. IEEE Transactions on Visualization and Computer Graphics, 2016,23(1): 541-550. |
[17] | BOUTS Q W , SPECKMANN B . Clustered edge routing[C]// IEEE Pacific Visualization Symposium. 2015: 55-62. |
[18] | ROSVALL M , BERGSTROM C T . Maps of random walks on complex networks reveal community structure[C]// The National Academy of Sciences of the United States of America, 2008,105(4): 1118-1123. |
[19] | LIAO Q , SHI L , WANG C . Visual analysis of large-scale network anomalies[J]. IBM Journal of Research and Development, 2013,57(3/4):13: 1-13. |
[20] | SHI L , LIAO Q , TONG H ,et al. Hierarchical Focus+Context Het-erogeneous network visualization[C]// IEEE Pacific Visualization Symposium. 2014: 89-96. |
[21] | ZINSMAIER M , BRANDES U , DEUSSEN O ,et al. Interactive level-of-detail rendering of large graphs[J]. IEEE Transactions on Visualization and Computer Graphics, 2012,18(12): 2486-2495. |
[22] | BENJAMIN B , EMMANUEL P,JEAN-DANIEL F . GraphDiaries:animated transitions and temporal navigation for dynamic networks[J]. IEEE Transactions on Visualization and Computer Graphics, 2014,20(5): 740-754. |
[23] | GRIFFEN A L , MACEACHREN A M , HARDISTY F ,et al. A comparison of animated maps with static small-multiple maps for visually identifying space-time clusters[J]. Annals of the Association of American Geographers, 2006,96(4): 740-753. |
[24] | LIN C C , LEE Y Y , YEN H C . Mental map preserving graph drawing using simulated annealing[J]. Information Science, 2011,181(19): 4253-4272. |
[25] | FRISHMAN Y , TAL A . Dynamic drawing of clustered graphs[C]// IEEE Symposium on Information Visualization. 2004: 191-198. |
[26] | FISHERMAN Y , TAL A . Online dynamic graph drawing[J]. IEEE Transactions on Visualization and Computer Graphics, 2008,14(4): 727-740. |
[27] | CHE L , LIANG J , YUAN X ,et al. Laplacian-based dynamic graph visualization[C]// IEEE Pacific Visualization Symposium. 2015: 69-73. |
[28] | KUMAR G , GARLAND M . Visual exploration of complex time-varying graphs[J]. IEEE Transactions on Visualization and Computer Graphics, 2006,12(5): 805-812. |
[29] | JAMES A , STEFFEN H , HEIDRUN S ,et al. A modular degree-of-interest specification for the visual analysis of large dynamic networks[J]. IEEE Transactions on Visualization and Computer Graphics, 2014,20(3): 337-350. |
[30] | CUI W , WANG X , LIU S ,et al. Let it flow:a static method for exploring dynamic graphs[C]// IEEE Pacific Visualization Symposium. 2014: 121-128. |
[31] | SHNEIDERMAN B , . The eye have it:a task by data type taxonomy for information visualization[C]// IEEE Symposium on Visual Languages. 1996: 336-343 |
[32] | KEIN D A . Information visualization and visual data mining[J]. IEEE Transactions on Visualization and Computer Graphics, 2014,20(3): 377-390 |
[33] | WARD M O , YANG J . Interaction spaces in data and information visualization[C]// The 6th Joint Euro graphics/IEEE TCVG Symposium on Visualization. 2004: 137-146 |
[34] | ROBERT B , GLENN A F , CHRIS N . Home-centric visualization of network traffic for security administration[C]// The ACM Workshop on Visualization and Data Mining for Computer Security. 2004, 55-64. |
[35] | FENG K C , WANG C , SHEN H W ,et al. Coherent time-varing graph drawing with multifocus+context interaction[J]. IEEE Transactions on Visualization and Computer Graphics, 2012,18(8): 1330-1342. |
[36] | BENJAMN B B , AARON C , MARY P C ,et al. DateLens:a fisheye calendar interface for PDAs[J]. ACM Transactions on Computer-Human Interaction, 2004,11(1): 90-119. |
[37] | TOMINSKI C , ABELLO J , VAN HAM F ,et al. Fisheye tree views and lenses for graph visualization[C]// The Conference on Information Visualization. 2006: 17-24. |
[38] | VAN-HAM F , VAN-WIJK J J . Interactive visualization of small world graphs[C]// The IEEE Symposium on Information Visualization. 2004: 199-206. |
[39] | GANSNER E R , KOREN Y , NORTH S C . Topological fisheye views for visualizing large graphs[J]. IEEE Transactions on Visualization and Computer Graphics, 2005,20(5): 740-754. |
[40] | FRISCH M , HEYDEKORN J , DACHSELT R . Diagram editing on interac-tive displays using multi-touch and pen gestures[C]// The 6th international conference on Diagrammatic representation and inference. 2010: 182-196. |
[41] | SCHMIDT S , NACENTA M A , DACHSELT R ,et al. A set of multi-touch graph interaction techniques[C]// ACM International Conference on Interactive Tabletops and Surfaces. 2010: 113-116. |
[42] | PROUZEAU A , BEZERIANOS A , CHAPUIS O . Evaluating multi-user selection for exploring graph topology on wall-displays[J]. IEEE Transactions on Visualization and Computer Graphics, 2017,23(8): 1936-1951. |
[43] | KISTER U , KLAMKA K , TOMINSKI C ,et al. GRASP:combining spatially-aware mobile devices and a display wall for graph visualization and interaction[J]. Computer Graphics Forum, 2017,36(3): 503-514. |
[44] | RUFIANGE S , MCGUFFIN M J . DiffAni:visualizing dynamic graphs with a hybrid of difference maps and animation[J]. IEEE Transactions on Visualization and Computer Graphics, 2013,19(12): 2556-2565. |
[45] | KO S , AFZAL S , WALTON S ,et al. Analyzing high-dimensional mul-tivariate network links with integrated anomaly detection,highlighting and exploration[C]// The IEEE Vis-ual Science and Technology. Los Alamitos:IEEE Computer So-ciety Press, 2014: 823-825. |
[46] | HADLAK S , SCHUMANN H , CAP C H ,et al. Supporting the visual analysis of dynamic networks by clustering associated temporal Attributes[J]. IEEE Transactions on Visualization and Computer Graphics, 2013,19(12): 2267-2276. |
[47] | DANG T N , PENDAR N , FORBES A G . TimeArcs:visualizing fluctuations in dynamic networks[J]. Computer Graphics Forum, 2016,35(3): 61-69. |
[48] | ELZEN S V D , HOLTEN D , BLAAS J ,et al. Reducing snapshots to points:a visual analytics approach to dynamic network exploration[J]. IEEE Transactions on Visualization and Computer Graphics, 2016,22(1): 1-10. |
[49] | DEDE C . Immersive interface for engagement and learning[J]. Science, 2009,323(5910): 66-69. |
[50] | TONG X , LI C , SHEN H W . GlyphLens:view-dependent occlusion management in the interactive glyph visualization[J]. IEEE Transactions on Visualization and Computer Graphics, 2017,23(1): 891-900. |
[51] | HUANG Y J , FUJIWARA T , LIN Y X ,et al. A gesture system for graph visualization in virtual reality environments[C]// IEEE VGTC Pacific Visualization Symposium. 2017: 41-45. |
[52] | KWON O H , MUELDER C , LEE K ,et al. A study of layout,rendering,and interaction methods for immersive graph visualization[J]. IEEE Transactions on Visualization and Computer Graphics, 2016,22(7): 1802-1815. |
[53] | CORDEIL M , DWYER T , KLEIN K ,et al. Immersive collaborative analysis of network connectivity:CAVE-style or head-mounted display?[J]. IEEE Transactions on Visualization and Computer Graphics, 2016,23(1): 441-450. |
[1] | Xianyi CHEN, Jun GU, Kai YAN, Dong JIANG, Linfeng XU, Zhangjie FU. Double adversarial attack against license plate recognition system [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 16-27. |
[2] | Tianpeng YE, Xiang LIN, Jianhua LI, Xuankai ZHANG, Liwen XU. Personalized lightweight distributed network intrusion detection system in fog computing [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 28-37. |
[3] | Lijun ZU, Yalin CAO, Xiaohua MEN, Zhihui LYU, Jiawei YE, Hongyi LI, Liang ZHANG. Adaptive selection method of desensitization algorithm based on privacy risk assessment [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 49-59. |
[4] | Ruiqi XIA, Manman LI, Shaozhen CHEN. Identification on the structures of block ciphers using machine learning [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 79-89. |
[5] | Jingyi YUAN, Zichuan LI, Guojun PENG. EN-Bypass: a security assessment method on e-mail user interface notification [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 90-101. |
[6] | Feng YU, Qingxin LIN, Hui LIN, Xiaoding WANG. Privacy-enhanced federated learning scheme based on generative adversarial networks [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 113-122. |
[7] | Chuntao ZHU, Chengxi YIN, Bolin ZHANG, Qilin YIN, Wei LU. Forgery face detection method based on multi-domain temporal features mining [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 123-134. |
[8] | Xiaomeng LI, Daidou GUO, Xunfang ZHUO, Heng YAO, Chuan QIN. Carrier-independent screen-shooting resistant watermarking based on information overlay superimposition [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 135-149. |
[9] | Zhao CAI, Tao JING, Shuang REN. Survey on Ethereum phishing detection technology [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 21-32. |
[10] | Yan PAN, Wei LIN, Yuefei ZHU. Progressive active inference method of protocol state machine [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 81-93. |
[11] | Pan YANG, Fei KANG, Hui SHU, Yuyao HUANG, Xiaoshao LYU. Binary program taint analysis optimization method based on function summary [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 115-131. |
[12] | Tian XIAO, Zhihao JIANG, Peng TANG, Zheng HUANG, Jie GUO, Weidong QIU. High-performance directional fuzzing scheme based on deep reinforcement learning [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 132-142. |
[13] | Chenghao YUAN, Yong LI, Shuang REN. Dynamic multi-keyword searchable encryption scheme [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 143-153. |
[14] | Zezhou HOU, Jiongjiong REN, Shaozhen CHEN. Security evaluation for parameters of SIMON-like cipher based on neural network distinguisher [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 154-163. |
[15] | Xuejing GUO, Yixiang FANG, Yi ZHAO, Tianzhu ZHANG, Wenchao ZENG, Junxiang WANG. Traditional guidance mechanism based deep robust watermarking [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 175-183. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|