A. Abdullah, J. Copeland, A. Abdullah, and C. Lee, Tool update, Proceedings of the 3rd international workshop on Visualization for computer security , VizSEC '06, pp.129-136, 2005.
DOI : 10.1145/1179576.1179587

J. Colombe and G. Stephens, Statistical profiling and visualization for detection of malicious insider attacks on computer networks, Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security , VizSEC/DMSEC '04, pp.138-142, 2004.
DOI : 10.1145/1029208.1029231

M. Daniel, . Bohn, A. Wynne, . E. William, S. Engle et al., Real-Time Visualization of Network Behaviors for Situational Awareness Visualizing distributed memory computations with hive plots VisAlert : From Idea to Product, Proc. of VizSEC'10 Proc. of VizSEC '12 Proc. of VizSEC'07, pp.79-90, 2007.

F. Glenn, A. Fink, V. Duggirala, R. Correa, and C. North, Bridging the Host-Network Divide : Survey, Taxonomy, and Solution, Proc. of LISA '06 : 20th Large Installation System Administration Conference, pp.247-262, 2006.

F. G. Fink, C. Muessig, and . North, Visual Correlation of Host Processes and Network Traffic, Proc. of VizSEC'05, pp.11-19, 2005.

G. Glanfield, . Brooks, . Taylor, C. Paterson, . Smith et al., OverFlow : An Overview Visualization for Network Analysis
DOI : 10.1109/vizsec.2009.5375536

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.154.4589

J. Goodall and W. Lutters, Preserving the big picture: visual network traffic analysis with TNV, IEEE Workshop on Visualization for Computer Security, 2005. (VizSEC 05)., pp.47-54, 2005.
DOI : 10.1109/VIZSEC.2005.1532065

H. Hertzog, Visualizations to Improve Reactivity Towards Security Incidents Inside Corporate Networks Hive Plots -Linear Layout for Network Visualization -Visually Interpreting Network Structure and Content Made Possible, Proc. of VizSEC'06, pp.95-101, 2006.

H. Harrison, W. Lu, and . Wang, Interactive detection of network anomalies via coordinated multiple views, Proceedings of the Seventh International Symposium on Visualization for Cyber Security, VizSec '10, pp.91-101, 2010.
DOI : 10.1145/1850795.1850806

I. Irwin and J. Van-riel, Using InetVis to Evaluate Snort and Bro Scan
DOI : 10.1007/978-3-540-78243-8_17

K. R. Kasemri, A Survey, Taxonomy, and Analysis of Network Security Visualization Techniques, 2006.

K. Kintzel, F. Fuchs, and . Mansmann, Monitoring large IP spaces with ClockView, Proceedings of the 8th International Symposium on Visualization for Cyber Security, VizSec '11, pp.1-210, 2011.
DOI : 10.1145/2016904.2016906

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.227.7079

K. Koike and K. Ohno, SnortView, Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security , VizSEC/DMSEC '04
DOI : 10.1145/1029208.1029232

K. Koike, Visualizing Cyber Attacks using IP Matrix, Proc. of Viz- SEC'05, pp.91-98, 2005.
DOI : 10.1109/vizsec.2005.22

L. Lakkaraju, E. Ave, and A. Lee, NVisionIP, Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security , VizSEC/DMSEC '04, pp.65-72, 2004.
DOI : 10.1145/1029208.1029219

L. Livnat, . Agutter, . Moon, S. Erbacher, and . Foresti, A visualization paradigm for network intrusion detection, Proceedings from the Sixth Annual IEEE Systems, Man and Cybernetics (SMC) Information Assurance Workshop, 2005., pp.92-99, 2005.
DOI : 10.1109/IAW.2005.1495939

L. Livnat, . Agutter, S. Moon, and . Foresti, Visual correlation for situational awareness, IEEE Symposium on Information Visualization (INFOVIS'05), pp.95-102, 2005.
DOI : 10.1109/infovis.2005.36

L. C. Lee and J. Copeland, Visual Firewall : Real-time Network Security Monitor Workshop on Visualization for Computer Security, Proc. of VizSEC'05, pp.129-136, 2005.

L. C. Lee and J. Copeland, Flowtag, Proceedings of the 3rd international workshop on Visualization for computer security , VizSEC '06, pp.103-108, 2006.
DOI : 10.1145/1179576.1179597

L. Lian, J. Monrose, and . Mchugh, Traffic classification using visual motifs, Proceedings of the Seventh International Symposium on Visualization for Cyber Security, VizSec '10, 2010.
DOI : 10.1145/1850795.1850804

K. Lakkaraju, . Slagell, S. Yurcik, and . North, Closing-the-Loop in NVisionIP : Integrating Discovery and Search in Security Visualizations

M. J. Mcpherson, L. Krystosk, and . Livermore, PortVis, Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security , VizSEC/DMSEC '04, pp.73-81, 2004.
DOI : 10.1145/1029208.1029220

M. Muelder, K. Ma, and T. Bartoletti, A Visualization Methodology for Characterization of Network Scans Workshop on Visualization for Computer Security, Proc. of VizSEC'05, pp.29-38, 2005.

P. J. Pearlman and P. Rheingans, Visualizing Network Security Events Using Compound Glyphs from a Service-Oriented Perspective
DOI : 10.1007/978-3-540-78243-8_9

R. Ranjan, BGP Eye : A New Visualization Tool for Real-time Detection and Analysis of BGP Anomalies, pp.81-90, 2003.

R. Roveta, D. Caviglia, . Mario, . Zanero, P. Maggi et al., BURN, Proceedings of the 8th International Symposium on Visualization for Cyber Security, VizSec '11, pp.1-610, 2011.
DOI : 10.1145/2016904.2016910

R. Rasmussen, . Ehrlich, . Ross, . Kirk, J. Gruen et al., Nimble cybersecurity incident management through visualization and defensible recommendations, Proceedings of the Seventh International Symposium on Visualization for Cyber Security, VizSec '10, pp.102-113, 2010.
DOI : 10.1145/1850795.1850807

S. Shiravi, A. Shiravi, and . Ghorbani, A Survey of Visualization Systems for Network Security, IEEE Transactions on Visualization and Computer Graphics, vol.18, issue.8, pp.1313-1329, 2012.
DOI : 10.1109/TVCG.2011.144

W. Williams, K. Lippmann, and . Ingols, An Interactive Attack Graph Cascade and Reachability Display, Proc. of VizSEC'07, pp.221-236, 2007.
DOI : 10.1007/978-3-540-78243-8_15

W. C. Wright, G. Monrose, and . Masson, Using visual motifs to classify encrypted traffic, Proceedings of the 3rd international workshop on Visualization for computer security , VizSEC '06, pp.41-50, 2003.
DOI : 10.1145/1179576.1179584

Y. Yin and E. Ave, VisFlowConnect, Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security , VizSEC/DMSEC '04, pp.26-34, 2004.
DOI : 10.1145/1029208.1029214

Y. +. Yu, J. Fuller, L. Bannick, R. Rossey, and . Cunningham, Integrated Environment Management for Information Operations Testbeds, pp.67-83
DOI : 10.1007/978-3-540-78243-8_5

Y. Yu, B. Fuller, J. Bannick, L. Rossey, and R. Cunningham, Integrated Environment Management for Information Operations Testbeds LARIAT Provides High-Fidelity Network Emulation and User Simulation, pp.1-25, 2007.

Y. Yelizarov and D. Gamayunov, Visualization of complex attacks and state of attacked network, 2009 6th International Workshop on Visualization for Cyber Security, pp.1-9, 2009.
DOI : 10.1109/VIZSEC.2009.5375527

Y. Yu, S. Riordan, and . Boyer, EMBER, Proceedings of the Seventh International Symposium on Visualization for Cyber Security, VizSec '10, 2010.
DOI : 10.1145/1850795.1850796

Y. W. Yurcik, Tool update, Proceedings of the 3rd international workshop on Visualization for computer security , VizSEC '06, pp.65-66, 2006.
DOI : 10.1145/1179576.1179589