Abstract:Existing monitoring methods have been used for network traffic and network malicious such as using a network monitoring system or network intrusion system. These systems mainly focus to capture traffic and anomaly data. After the capturing process, the data is visualized without doing any analysis on these captured network data. Besides, there are a number of tools with visualization techniques (e.g. Scatterplot, bar graph) that can be applied in the network monitoring system. The one-dimensional (1D), two-dim… Show more
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.