{"_id":"vXQcmjqBe5CbhbjGj","bibbaseid":"atkison-pensy-nicholas-ebert-atkison-morris-casestudyvisualizationandinformationretrievaltechniquesfornetworkintrusiondetection-2001","downloads":0,"creationDate":"2015-12-10T09:27:53.800Z","title":"Case Study: Visualization and Information Retrieval Techniques for Network Intrusion Detection.","author_short":["Atkison, T.","Pensy, K.","Nicholas, C. K.","Ebert, D. S.","Atkison, R.","Morris, C. J."],"year":2001,"bibtype":"inproceedings","biburl":"http://www.bibsonomy.org/bib/author/\"David Barner\"?items=1000","bibdata":{"bibtype":"inproceedings","type":"inproceedings","added-at":"2015-12-01T00:00:00.000+0100","author":[{"propositions":[],"lastnames":["Atkison"],"firstnames":["Travis"],"suffixes":[]},{"propositions":[],"lastnames":["Pensy"],"firstnames":["Kathleen"],"suffixes":[]},{"propositions":[],"lastnames":["Nicholas"],"firstnames":["Charles","K."],"suffixes":[]},{"propositions":[],"lastnames":["Ebert"],"firstnames":["David","S."],"suffixes":[]},{"propositions":[],"lastnames":["Atkison"],"firstnames":["Rebekah"],"suffixes":[]},{"propositions":[],"lastnames":["Morris"],"firstnames":["Christopher","J."],"suffixes":[]}],"biburl":"http://www.bibsonomy.org/bibtex/268778ea8dc07f15a873d570f9cff86f6/dblp","booktitle":"VisSym","crossref":"conf/vissym/2001","editor":[{"propositions":[],"lastnames":["Ebert"],"firstnames":["David","S."],"suffixes":[]},{"propositions":[],"lastnames":["Favre"],"firstnames":["Jean","M."],"suffixes":[]},{"propositions":[],"lastnames":["Peikert"],"firstnames":["Ronald"],"suffixes":[]}],"ee":"http://dx.doi.org/10.2312/VisSym/VisSym01/283-290","interhash":"0e53500bb098496f4d2903751a272e68","intrahash":"68778ea8dc07f15a873d570f9cff86f6","isbn":"3-211-83674-8","keywords":"dblp","pages":"283-290","publisher":"Eurographics Association","timestamp":"2015-12-02T11:42:58.000+0100","title":"Case Study: Visualization and Information Retrieval Techniques for Network Intrusion Detection.","url":"http://dblp.uni-trier.de/db/conf/vissym/vissym2001.html#AtkisonPNEAM01","year":"2001","bibtex":"@inproceedings{conf/vissym/AtkisonPNEAM01,\n added-at = {2015-12-01T00:00:00.000+0100},\n author = {Atkison, Travis and Pensy, Kathleen and Nicholas, Charles K. and Ebert, David S. and Atkison, Rebekah and Morris, Christopher J.},\n biburl = {http://www.bibsonomy.org/bibtex/268778ea8dc07f15a873d570f9cff86f6/dblp},\n booktitle = {VisSym},\n crossref = {conf/vissym/2001},\n editor = {Ebert, David S. and Favre, Jean M. and Peikert, Ronald},\n ee = {http://dx.doi.org/10.2312/VisSym/VisSym01/283-290},\n interhash = {0e53500bb098496f4d2903751a272e68},\n intrahash = {68778ea8dc07f15a873d570f9cff86f6},\n isbn = {3-211-83674-8},\n keywords = {dblp},\n pages = {283-290},\n publisher = {Eurographics Association},\n timestamp = {2015-12-02T11:42:58.000+0100},\n title = {Case Study: Visualization and Information Retrieval Techniques for Network Intrusion Detection.},\n url = {http://dblp.uni-trier.de/db/conf/vissym/vissym2001.html#AtkisonPNEAM01},\n year = 2001\n}\n\n","author_short":["Atkison, T.","Pensy, K.","Nicholas, C. K.","Ebert, D. S.","Atkison, R.","Morris, C. J."],"editor_short":["Ebert, D. S.","Favre, J. M.","Peikert, R."],"key":"conf/vissym/AtkisonPNEAM01","id":"conf/vissym/AtkisonPNEAM01","bibbaseid":"atkison-pensy-nicholas-ebert-atkison-morris-casestudyvisualizationandinformationretrievaltechniquesfornetworkintrusiondetection-2001","role":"author","urls":{"Link":"http://dx.doi.org/10.2312/VisSym/VisSym01/283-290","Paper":"http://dblp.uni-trier.de/db/conf/vissym/vissym2001.html#AtkisonPNEAM01"},"keyword":["dblp"],"downloads":0},"search_terms":["case","study","visualization","information","retrieval","techniques","network","intrusion","detection","atkison","pensy","nicholas","ebert","atkison","morris"],"keywords":["dblp"],"authorIDs":[],"dataSources":["q834SFRu5LXFafhq7"]}