[1]
พรหมฤทธิ ณ. and มิ่งขวัญ อ., “The Parallel Coordinates Methodology to Study Suspicious Behavior on a Computer Network”, JIST, vol. 2, no. 1, pp. 12–20, Jun. 2011.