@inproceedings{0145bb717e284538a3a1719e000eb469,
title = "Visual analytics for network flow analysis",
abstract = "Large corporations and government agencies are continually bombarded by malicious network attacks through the cyber infrastructure. One common method to identify and assess the impacts of these malicious activities is through the monitoring and analysis of network flow data. While already somewhat aggregated, the data can quickly become overwhelming - a billion flow records a day for large organizations is not abnormal. We have integrated our visual analytics toolkit with network flow data to provide a seamless workflow for computer network defense analysts. This integration can facilitate the learning process of novice analysts and make expert analysts more productive.",
author = "{R. Goodall}, John and {R. Tesone}, Daniel",
year = "2009",
doi = "10.1109/CATCH.2009.47",
language = "English",
isbn = "9780769535685",
series = "Proceedings - Cybersecurity Applications and Technology Conference for Homeland Security, CATCH 2009",
pages = "199--204",
booktitle = "Proceedings - Cybersecurity Applications and Technology Conference for Homeland Security, CATCH 2009",
note = "Cybersecurity Applications and Technology Conference for Homeland Security, CATCH 2009 ; Conference date: 03-03-2009 Through 04-03-2009",
}