1. Marty R. Applied Security Visualization. Indiana: Addison Wesley Professional Indianapolis, 2008
2. Shin M S, Kim E H, Ryu K H. False alarm classification model for network-based intrusion detection system. Lect Note Comput Sci, 2004, 3177: 259–265
3. Lakkaraju K, Bearavolu R, Slagell A, et al. Closing-the-loop in NVisionIP: integrating discovery and search in security visualizations. In: IEEE Workshop on Visualization for Computer Security, Minneapolis, 2005. 75–82
4. Abdullah K, Lee C, Conti G, et al. IDS RainStorm: visualizing IDS alarms. In: IEEE Workshop on Visualization for Computer Security, Minneapolis, 2005. 1–10
5. Koike H, Ohno K. SnortView: visualization system of snort logs. In: The ACM workshop on Visualization and data mining for computer security, Washington, 2004. 143–147