1. Roesch, M.: Snort-Lightweight Intrusion Detection For Networks. In: 13th USENIX Conference on System Administration, pp. 229–238. USENIX Association (1999)
2. Paxson, V.: Bro: a System for Detecting Network Intruders in Real-time. Computer Networks 31, 2435–2463 (1999)
3. Erbacher, R.F., Walker, K.L., Frincke, D.A.: Intrusion and Misuse Detection in Large-Scale Systems. IEEE Computer Graphics and Applications 22(1), 38–47 (2002)
4. Livnat, Y., Agutter, J., Moon, S., Erbacher, R.F., Foresti, S.: A Visualization Paradigm for Network Intrusion Detection. In: 6th Annual IEEE SMC Information Assurance Workshop, pp. 92–99. IEEE, West Point (2005)
5. Dang, T.T., Dang, T.K.: Visualization of Web Form Submissions for Security Analysis. International Journal of Web Information Systems Information 9(2), 165–180 (2013)