1. Moti Bani. 2016. Process Monitor for Dynamic Malware Analysis. https://blogs.technet.microsoft.com/motiba/2016/05/04/ process-monitor-for-dynamic-malware-analysis/. Moti Bani. 2016. Process Monitor for Dynamic Malware Analysis. https://blogs.technet.microsoft.com/motiba/2016/05/04/ process-monitor-for-dynamic-malware-analysis/.
2. D³ Data-Driven Documents
3. New Jersey Cybersecurity Communications Integration Cell. 2017. NJRat. https: //www.cyber.nj.gov/threat-profiles/trojan-variants/njrat. New Jersey Cybersecurity Communications Integration Cell. 2017. NJRat. https: //www.cyber.nj.gov/threat-profiles/trojan-variants/njrat.
4. Tuan Nhon Dang Nick Pendar and Angus G. Forbes. 2016. TimeArcs: Visualizing Fluctuations in Dynamic Networks. Computer Graphics Forum (2016). Tuan Nhon Dang Nick Pendar and Angus G. Forbes. 2016. TimeArcs: Visualizing Fluctuations in Dynamic Networks. Computer Graphics Forum (2016).
5. Visualization techniques for efficient malware detection