1. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;GG Granadillo,2015
2. Lecture Notes in Computer Science;M Kolomeec,2017
3. Marty, R.: Applied Security Visualization. Addison-Wesley, Upper Saddle River (2009)
4. Kolomeec, M., Chechulin, A., Pronoza, A., Kotenko, I.: Technique of data visualization: example of network topology display for security monitoring. J. Wirel. Mobile Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 7(1), 58–78 (2016)
5. Chechulin, A., Kotenko, I.: Attack tree-based approach for real-time security event processing. Autom. Control Comput. Sci. 49, 701–704 (2015)