1. Shiravi H, Shiravi A, Ghorbani A A. A survey of visualization systems for network security. IEEE Trans Visual Comput Graph, 2012, 18: 1313–1329
2. Pearlman J, Rheingans P. Visualizing network security events using compound glyphs from a service-oriented perspective. In: Proceedings of the Workshop on Visualization for Computer Security, Sacramento, 2008. 131–146
3. Janies J. Existence plots: a low-resolution time series for port behavior analysis. In: Proceedings of the 5th International Workshop on Visualization for Computer Security, Cambridge, 2008. 161–168
4. Koike H, Ohno K. SnortView: visualization system of snort logs. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, Washington, 2004. 143–147
5. Bertini E, Hertzog P, Lalanne D. Spiralview: towards security policies assessment through visual correlation of network resources with evolution of alarms. In: Proceedings of IEEE Symposium on Visual Analytics Science and Technology, Washington, 2007. 139–146