"Understanding Intrusion Detection through Visualization (Advances in Information Security)" - Information and Links:

Understanding Intrusion Detection through Visualization (Advances in Information Security) - Info and Reading Options

Book's cover
The cover of “Understanding Intrusion Detection through Visualization (Advances in Information Security)” - Open Library.

"Understanding Intrusion Detection through Visualization (Advances in Information Security)" is published by Springer in November 21, 2005 - New York, it has 145 pages and the language of the book is English.


“Understanding Intrusion Detection through Visualization (Advances in Information Security)” Metadata:

  • Title: ➤  Understanding Intrusion Detection through Visualization (Advances in Information Security)
  • Authors:
  • Language: English
  • Number of Pages: 145
  • Publisher: Springer
  • Publish Date:
  • Publish Location: New York

“Understanding Intrusion Detection through Visualization (Advances in Information Security)” Subjects and Themes:

Edition Identifiers:

AI-generated Review of “Understanding Intrusion Detection through Visualization (Advances in Information Security)”:


"Understanding Intrusion Detection through Visualization (Advances in Information Security)" Description:

The Open Library:

With the ever increasing use of computers for critical systems, computer security that protects data and computer systems from intentional, malicious intervention, continues to attract significant attention. Among the methods for defense, the application of a tool to help the operator identify ongoing or already perpetrated attacks (intrusion detection), has been the subject of considerable research in the past ten years. A key problem with current intrusion detection systems is the high number of false alarms they produce. Understanding Intrusion Detection through Visualization presents research on why false alarms are, and will remain a problem; then applies results from the field of information visualization to the problem of intrusion detection. This approach promises to enable the operator to identify false (and true) alarms, while aiding the operator to identify other operational characteristics of intrusion detection systems. This volume presents four different visualization approaches, mainly applied to data from web server access logs. Understanding Intrusion Detection through Visualization is structured for security professionals, researchers and practitioners. This book is also suitable for graduate students in computer science.

Read “Understanding Intrusion Detection through Visualization (Advances in Information Security)”:

Read “Understanding Intrusion Detection through Visualization (Advances in Information Security)” by choosing from the options below.

Search for “Understanding Intrusion Detection through Visualization (Advances in Information Security)” downloads:

Visit our Downloads Search page to see if downloads are available.

Find “Understanding Intrusion Detection through Visualization (Advances in Information Security)” in Libraries Near You:

Read or borrow “Understanding Intrusion Detection through Visualization (Advances in Information Security)” from your local library.

Buy “Understanding Intrusion Detection through Visualization (Advances in Information Security)” online:

Shop for “Understanding Intrusion Detection through Visualization (Advances in Information Security)” on popular online marketplaces.