1. Cheswick W, Belovin S (1995) Firewalls and internet security. Addison-Wesley, Reading
2. Al-Shaer ES, Hamed HH (2002) Design and implementation of firewall policy advisor tools, Technical report CTI-techrep0801
3. Al-Shaer ES, Hamed HH (2003) Firewall policy advisor for anomaly discovery and rule editing. In: IFIP/IEEE 8th international symposium on integrated network management
4. Tran T, Al-Shaer E, Boutaba R (2007) PolicyVis: firewall security policy visualization and inspection. In: Proceedings of the 21st large installation system administration conference (LISA ‘07)
5. Marty R (2009) Applied security visualization. Addison Wesley, Reading