| 2 | -- | 0 | Xuemin Shen. Editor's note |
| 4 | -- | 5 | John R. Goodall, Florian Mansmann, John Gerth. Computer network visualization [Guest Editorial] |
| 6 | -- | 11 | Lane Harrison, Aidong Lu. The future of security visualization: Lessons from network visualization |
| 12 | -- | 18 | Maxime Dumas, Jean-Marc Robert, Michael J. McGuffin. Alertwheel: radial bipartite graph visualization applied to intrusion detection system alerts |
| 19 | -- | 25 | Frédéric Massicotte, Mathieu Couture, Hugues Normandin, Mathieu Letourneau. Navigating and visualizing the malware intelligence space |
| 26 | -- | 32 | Simon Knight, Nickolas J. G. Falkner, Hung X. Nguyen, Paul Tune, Matthew Roughan. I can see for miles: Re-visualizing the internet |
| 33 | -- | 39 | Ernst Biersack, Quentin Jacquemart, Fabian Fischer, Johannes Fuchs, Olivier Thonnard, Georgios Theodoridis, Dimitrios Tzovaras, Pierre-Antoine Vervier. Visual analytics for BGP monitoring and prefix hijacking identification |
| 40 | -- | 46 | Urban Sedlar, Mojca Volk, Janez Sterle, Andrej Kos, Radovan Sernec. Contextualized monitoring and root cause discovery in IPTV systems using data visualization |
| 48 | -- | 53 | Camillo Gentile, David W. Griffith, Michael R. Souryal. Wireless network deployment in the smart grid: Design and evaluation issues |
| 54 | -- | 60 | Adlen Ksentini, Yassine Hadjadj Aoul, Tarik Taleb. Cellular-based machine-to-machine: overload control |
| 61 | -- | 68 | Luca Valcarenghi, Dung Pham Van, Pier Giorgio Raponi, Piero Castoldi, Divanilson R. Campelo, Shing-Wa Wong, She-Hwa Yen, Leonid G. Kazovsky, Shinji Yamashita. Energy efficiency in passive optical networks: where, when, and how? |
| 69 | -- | 74 | Kui Ren, Cong Wang, Qian Wang. Toward secure and effective data utilization in public cloud |
| 75 | -- | 80 | Yuval Shavitt, Noa Zilberman. Arabian nights: measuring the arab internet during the 2011 events |