Assessing the authenticity of distributed hash table
A visual analytics approach to network security hygiene
Securing an outsourced network detecting and preventing malware infections