1Shiravi H, Shiravi A, Ghorbani A A. A survey of visualization systems for network security [J]. IEEE Transactions on Visualization and Computer Graphics, 2012, 18(8) - 1313-1329.
2Harrison L, Lu A. The future of security visualization: lessons from network visualization [J]. IEEE Network, 2012, 26(6): 6-11.
3Becket R A, Eick S G, Wilks A R. Visualizing network data [J]. IEEE Transactions on Visualization and Computer Graphics, 1995, 1(1): 16-28.
4Girardin L, Brodbeck D. A visual approach for monitoring logs [C] //Proceedings of Large Installation System Administration Conference. New York- ACM Press, 1998: 299-308.
7Nataraj L, Karthikeyan S, Jacob G, et al. Malware images: visualization and automatic classification [C] //Proceedings of the 8th International Symposium on Visualization for Cyher Security. New York: ACM Press, 2011:4-11.
8Mansmann F, G6bel T, Cheswick W. Visual analysis of complex firewall configurations [C] //Proceedings of the 9th International Symposium on Visualization for Cyber Security. New York.. ACM Press, 2012:1-8.
9Koike H, Ohno K, Koizumi K. Visualizing cyber-attacks using IP matrix [C] //Proceedings of Visualization for Computer Security. Los Alamitos- IEEE Computer Society Press, 2005:91-98.
10Atkison T, Pensy K, Nicholas C, et al. Case study: visualization and information retrieval techniques for network intrusion detection [M] //Data Visualization. Hedelberg: Springer, 2001:283-290.