5Shiravi H, Shiravi A, Ghorbani A A. A survey of visualization systems for network security [J]. IEEE Transactions on Visualization and Computer Graphics, 2012, 18(8) - 1313-1329.
6Harrison L, Lu A. The future of security visualization: lessons from network visualization [J]. IEEE Network, 2012, 26(6): 6-11.
7Becket R A, Eick S G, Wilks A R. Visualizing network data [J]. IEEE Transactions on Visualization and Computer Graphics, 1995, 1(1): 16-28.
8Girardin L, Brodbeck D. A visual approach for monitoring logs [C] //Proceedings of Large Installation System Administration Conference. New York- ACM Press, 1998: 299-308.