M. Anwar, P. W. Fong, X. Yang, and H. Hamilton, Visualizing Privacy Implications of Access Control Policies in Social Network Systems, Proc. of the 4th International Workshop on Data Privacy Management (DPM'09), pp.106-120, 2010.
DOI : 10.1007/978-3-642-11207-2_9

M. Anwar, L. Fong, and P. , A Visualisation Tool for Evaluating Access Control Policies in Facebook-style Social Network Systems, Proc. of the 27th Annual ACM Symposium on Applied Computing (SAC'2012, pp.1443-1450, 2012.

M. Chu, K. Ingols, R. Lippmann, S. Webster, and S. Boyer, Visualizing attack graphs, reachability, and trust relationships with NAVIGATOR, Proceedings of the Seventh International Symposium on Visualization for Cyber Security, VizSec '10, pp.22-33, 2010.
DOI : 10.1145/1850795.1850798

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.375.3117

M. Ficco and L. Romano, A Generic Intrusion Detection and Diagnoser System Based on Complex Event Processing, 2011 First International Conference on Data Compression, Communications and Processing, pp.275-284, 2011.
DOI : 10.1109/CCP.2011.43

F. Fischer, J. Fuchs, and F. Mansmann, ClockMap: Enhancing Circular Treemaps with Temporal Glyphs for Time-Series Data, Proceedings of the Eurographics Conference on Visualization (EuroVis), pp.97-101, 2012.

O. 'hare, S. Noe, S. Prole, and K. , A Graph-theoretic Visualisation Approach to Network Risk Analysis, Proc. of the 5th International Workshop on Visualisation for Computer Security (VizSec'08), pp.60-67, 2008.

L. Harrison, R. Spahn, M. Iannacone, E. Downing, and J. R. Goodall, NV, Proceedings of the Ninth International Symposium on Visualization for Cyber Security, VizSec '12, 2012.
DOI : 10.1145/2379690.2379694

A. Heitzmann, B. Palazzi, C. Papamanthou, and R. Tamassia, Effective Visualisation of File System Access-Control, Proc. of the 5th international workshop on Visualisation for Computer Security (VizSec'08), pp.18-25, 2008.

J. Homer, A. Varikuti, X. Ou, and M. A. Mcqueen, Improving Attack Graph Visualisation through Data Reduction and Attack Grouping, Proc. of the 5th international workshop on Visualisation for Computer Security (VizSec'08), pp.68-79, 2008.
DOI : 10.1007/978-3-540-85933-8_7

URL : http://cis.ksu.edu/~xou/publications/vizsec08.pdf

D. Inoue, M. Eto, K. Suzuki, M. Suzuki, and K. Nakao, DAEDALUS-VIZ, Proceedings of the Ninth International Symposium on Visualization for Cyber Security, VizSec '12, 2012.
DOI : 10.1145/2379690.2379700

T. Komiyama, Usability Evaluation Based on International Standards for Software Quality Evaluation, Nec Technical Journal, vol.3, issue.2, 2008.

I. Kotenko and A. Chechulin, Attack Modeling and Security Evaluation in SIEM Systems, International Transactions on Systems Science and Applications, vol.8, pp.129-147, 2012.
DOI : 10.1109/greencom.2012.24

K. Lakkaraju, W. Yurcik, and A. J. Lee, NVisionIP, Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security , VizSEC/DMSEC '04, pp.65-72, 2004.
DOI : 10.1145/1029208.1029219

S. Lau, The Spinning Cube of Potential Doom, Communications of the ACM, vol.47, issue.6, pp.24-26, 2004.
DOI : 10.1145/990680.990699

C. P. Lee, J. Trost, N. Gibbs, N. Beyah, and J. A. Copeland, Visual firewall: real-time network security monitor, IEEE Workshop on Visualization for Computer Security, 2005. (VizSEC 05)., pp.129-136, 2005.
DOI : 10.1109/VIZSEC.2005.1532075

F. Mansmann, T. Göbel, and W. Cheswick, Visual analysis of complex firewall configurations, Proceedings of the Ninth International Symposium on Visualization for Cyber Security, VizSec '12, 2012.
DOI : 10.1145/2379690.2379691

R. Marty, Applied Security Visualisation, NY, 2008.

J. Montemayor, A. Freeman, J. Gersh, T. Llanso, and D. Patrone, Information Visualisation for Rule-based Resource Access Control, Proc. of International Symposium on Usable Privacy and Security (SOUPS), 2006.

S. Noel, M. Jacobs, P. Kalapa, and S. Jajodia, Multiple Coordinated Views for Network Attack Graphs, Proc. of the IEEE Workshops on Visualisation for Computer Security, p.12, 2005.
DOI : 10.1109/vizsec.2005.1532071

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.89.7407

S. Noel and S. Jajodia, Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices, 21st Annual Computer Security Applications Conference (ACSAC'05), pp.160-169, 2005.
DOI : 10.1109/CSAC.2005.58

E. Novikova and I. Kotenko, Analytical Visualization Techniques for Security Information and Event Management, 2013 21st Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, pp.519-525, 2013.
DOI : 10.1109/PDP.2013.84

K. Ohno, H. Koike, and K. Koizumi, IP Matrix: an effective visualization framework for cyber threat monitoring RedSeal Networks Vulnerability & Risk Management Solution, Proc. of the 9th International Conference on Information Visualization (IV05), pp.678-685, 2005.
DOI : 10.1109/iv.2005.67

J. Stasko, R. Catrambone, M. Guzdial, and K. Mcdonald, An evaluation of space-filling information visualizations for depicting hierarchical structures, International Journal of Human-Computer Studies, vol.53, issue.5, pp.663-694, 2000.
DOI : 10.1006/ijhc.2000.0420

T. Taylor, S. Brooks, J. Mchugh, and S. Brooks, NetBytes Viewer: An Entity-Based NetFlow Visualization Utility for Identifying Intrusive Behavior, VizSEC 2007: Proc. of the 2007 Workshop on Visualization for Computer Security, pp.101-114, 2008.
DOI : 10.1007/978-3-540-78243-8_7

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.157.132

T. Tran, E. Al-shaer, and R. Boutaba, PolicyVis: Firewall Security Policy Visualisation and Inspection, Proc. of the 21st Conference on Large Installation System Administration Conference (LISA'07), USENIX Association, pp.1-16, 2007.

L. Williams, R. Lippmann, and K. Ingols, An Interactive Attack Graph Cascade and Reachability Display, Proc. of the Workshop on Visualisation for Computer Security, pp.221-236, 2007.
DOI : 10.1007/978-3-540-78243-8_15

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.295.2560

L. Williams, R. Lippmann, and K. Ingols, GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool, Proc. of the 5th International Workshop on Visualisation for Computer Security (VizSec'08), pp.44-59, 2008.
DOI : 10.1007/978-3-540-85933-8_5