M. Wang, A. Woodruff, and A. Kuchinsky, Guidelines for Using Multiple Views in Information Visualization, J. Advanced Visual Interfaces, pp.110-119, 2000.

L. Shi, L. Shi, Q. Liao, X. Sun, Y. Chen et al., Scalable network traffic visualization using compressed graphs, 2013 IEEE International Conference on Big Data, 2013.
DOI : 10.1109/BigData.2013.6691629

J. Klyshinskij, S. Rysakov, and A. Shihov, Review of the methods of multidimensional data visualization. J. New information technologies in automated systems, pp.519-530, 2014.

R. Marty, Applied Security Visualization, 2009.

M. Kwan-liu, Cyber Security Through Visualization, Asia Pacific Symposium on Information Visualisation, 2006.

S. Noel and S. Jajodia, Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices, 21st Annual Computer Security Applications Conference (ACSAC'05), 2005.
DOI : 10.1109/CSAC.2005.58

S. Lau, The Spinning Cube of Potential Doom, Communications of the ACM, vol.47, issue.6, pp.24-26, 2004.
DOI : 10.1145/990680.990699

L. Harrison, R. Spahn, M. Iannacone, E. Downing, and J. Goodall, Nessus Vulnerability Visualization for the Web, VizSec '12, 2012.

L. Williams, R. Lippmann, and K. Ingols, GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool, 5th International Workshop on Visualisation for Computer Security (VizSec'08), 2008.
DOI : 10.1007/978-3-540-85933-8_5

M. Mcguffin, Simple algorithms for network visualization: A tutorial, Tsinghua Science and Technology, vol.17, issue.4, 2012.
DOI : 10.1109/TST.2012.6297585

E. Novikova and I. Kotenko, Analytical Visualization Techniques for Security Information and Event Management, 2013 21st Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, 2013.
DOI : 10.1109/PDP.2013.84

J. Montemayor, A. Freeman, J. Gersh, T. Llanso, and D. Patrone, Information Visualisation for Rule-based Resource Access Control, International Symposium on Usable Privacy and Security (SOUPS), 2006.

E. Glatz, E. Glatz, S. Mavromatidis, and B. Ager, Visualizing big network traffic data using frequent pattern mining and hypergraphs, Dimitropoulos X. Proc. of the First IMC Workshop on Internet Visualization, 2012.
DOI : 10.1109/TKDE.2005.81

F. Mansmann, F. Mansmann, F. Fischer, D. A. Keim, and S. C. North, Visual support for analyzing network traffic and intrusion detection events using TreeMap and graph representations, Proceedings of the Symposium on Computer Human Interaction for the Management of Information Technology, CHiMiT '09, pp.19-28, 2009.
DOI : 10.1145/1641587.1641590

I. Kotenko and A. Chechulin, Common Framework for Attack Modeling and Security Evaluation in SIEM Systems, 2012 IEEE International Conference on Green Computing and Communications, 2012.
DOI : 10.1109/GreenCom.2012.24

M. Kolomeec, A. Chechulin, and I. Kotenko, ?????????? ???????????????????????????????? ???????????????????? ?????? ???????????????????? ???????????????????? ???????????? ???????????????????????? ????????????, SPIIRAS Proceedings, vol.5, issue.42, pp.60-84, 2015.
DOI : 10.15622/sp.42.12

F. Aurenhammer, R. Klein, and D. Lee, Voronoi Diagrams and Delaunay Triangulations, 2013.
DOI : 10.1142/8685