{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T20:20:00Z","timestamp":1740169200619,"version":"3.37.3"},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802320","61872304"],"award-info":[{"award-number":["61802320","61872304"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development Project of China","award":["2016QY04W0801"],"award-info":[{"award-number":["2016QY04W0801"]}]},{"DOI":"10.13039\/501100009000","name":"National Defense Pre-Research Foundation of China","doi-asserted-by":"publisher","award":["JCKY2018404C001","JCKY2019204B007"],"award-info":[{"award-number":["JCKY2018404C001","JCKY2019204B007"]}],"id":[{"id":"10.13039\/501100009000","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3033391","type":"journal-article","created":{"date-parts":[[2020,10,23]],"date-time":"2020-10-23T19:34:43Z","timestamp":1603481683000},"page":"194523-194540","source":"Crossref","is-referenced-by-count":10,"title":["PTVis: Visual Narrative and Auxiliary Decision to Assist in Comprehending the Penetration Testing Process"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5378-6316","authenticated-orcid":false,"given":"Sijie","family":"Zheng","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0919-9151","authenticated-orcid":false,"given":"Yadong","family":"Wu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7047-8726","authenticated-orcid":false,"given":"Song","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3436-1966","authenticated-orcid":false,"given":"Yong","family":"Wei","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1913-3925","authenticated-orcid":false,"given":"Dongsheng","family":"Mu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1743-5540","authenticated-orcid":false,"given":"Huan","family":"He","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7889-2668","authenticated-orcid":false,"given":"Dongxuan","family":"Han","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3705-9324","authenticated-orcid":false,"given":"Jing","family":"Liao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6689-6848","authenticated-orcid":false,"given":"Huarong","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2923.2001.01022.x"},{"key":"ref38","article-title":"Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains","volume":"1","author":"hutchins","year":"2011","journal-title":"Leading Issues in Information Warfare and Security Research"},{"key":"ref33","first-page":"231","article-title":"Applying the ISO 9126 quality model to test specifications&#x2013;exemplified for TTCN-3 test specifications","author":"zeiss","year":"2007","journal-title":"Proc Softw Eng Fachtagung des GI-Fachbereichs Softwaretechnik"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.4236\/jsea.2012.52011"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.5220\/0005097303630368"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16985-4_9"},{"key":"ref37","volume":"54","author":"cook","year":"2005","journal-title":"Illuminating the Path The Research and Development Agenda for Visual Analytics"},{"journal-title":"Open Web Application Security Project Top 10","year":"2017","key":"ref36"},{"key":"ref35","first-page":"47","article-title":"Software quality evaluation system based on ISO\/IEC 9126 standard","volume":"31","author":"zongkui","year":"2004","journal-title":"J Xidian Univ"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.08.001"},{"year":"2013","key":"ref28"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.23"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13911-6_15"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(13)70039-3"},{"key":"ref1","first-page":"256","article-title":"Vulnerability analysis of faults\/attacks in network centric systems","author":"hariri","year":"2003","journal-title":"Proc ISCA PDCS"},{"key":"ref20","first-page":"305","article-title":"FlowScan: A network traffic flow reporting and visualization tool","author":"plonka","year":"2000","journal-title":"Proc LISA"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-013-4891-9"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029219"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1111\/cgf.12904"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25243-3_32"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2010.5593242"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2015.7312767"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1201\/b17511"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/BMEI.2015.7401618"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2012.212"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1080\/09658211.2015.1031679"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7091-6783-0_4"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23659"},{"journal-title":"Open Source Security Testing Methodology Manual","year":"2015","author":"herzog","key":"ref10"},{"journal-title":"Information systems security assessment framework","year":"2006","key":"ref11"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.tourman.2005.05.018"},{"journal-title":"The Penetration Testing Execution Standard Documentation","year":"2017","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2011.144"},{"key":"ref14","first-page":"687","article-title":"A survey on network security data visualization","volume":"26","author":"ying","year":"2014","journal-title":"J Comput -Aided Des Comput Graph"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2018.2879067"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2018.2865028"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029217"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2007.70522"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029220"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2018.2816203"},{"key":"ref3","first-page":"15","article-title":"Attack net penetration testing","author":"mcdermott","year":"2001","journal-title":"Proceedings New Security Paradigms Workshop"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029216"},{"key":"ref5","first-page":"14","article-title":"Visual elaboration and comprehension of text","volume":"14","author":"matz","year":"1971","journal-title":"Audiovisual Aids"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2018.8709204"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2016904.2016907"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2014.231"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2015.7312765"},{"journal-title":"Data Visualization","year":"2013","author":"wei","key":"ref46"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2016.73"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/iV.2015.30"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"657","DOI":"10.1109\/TVCG.2017.2746018","article-title":"Taking word clouds apart: An empirical investigation of the design space for keyword summaries","volume":"24","author":"felix","year":"2018","journal-title":"IEEE Trans Vis Comput Graphics"},{"journal-title":"Comprehension A Paradigm for Cognition","year":"1998","author":"kintsch","key":"ref42"},{"journal-title":"Web Penetration Testing with Kali Linux","year":"2019","author":"joseph","key":"ref41"},{"journal-title":"Dark Mode&#x2014;What is It and Why Do We Need It? Techahead","year":"2019","author":"sinha","key":"ref44"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70956-5_7"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09237998.pdf?arnumber=9237998","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T01:09:06Z","timestamp":1641949746000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9237998\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":55,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3033391","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2020]]}}}