Detecting flaws and intruders with visual data analysis

Soon Tee Teoh, Kwan-Liu Ma, Soon Felix Wu, T. J. Jankun-Kelly

Research output: Contribution to journalArticlepeer-review

46 Scopus citations


Incorporating human perception into the data mining process through interactive visualization can help in better understanding the complex behaviors of computer network systems. This paper illustrates three visualization based methods for detecting network flaws and intrusions. All three applications require appropriate visualization tools and interaction techniques. Because the nature of the data, the task, and the desired knowledge are all different, the visual metaphors used in each of the applications also differ.

Original languageEnglish (US)
Pages (from-to)27-35
Number of pages9
JournalIEEE Computer Graphics and Applications
Issue number5
StatePublished - Sep 1 2004

ASJC Scopus subject areas

  • Software
  • Medicine(all)
  • Computer Graphics and Computer-Aided Design


Dive into the research topics of 'Detecting flaws and intruders with visual data analysis'. Together they form a unique fingerprint.

Cite this