K. Abdullah and C. Lee, IDS RainStorm : Visualizing IDS Alarms Workshop on Visualization for Computer Security, pp.1-10

A. D. Amico and K. Whitley, The Real Work of Computer Network Defense Analysts The Analysis Roles and Processes that Transform, pp.19-37

J. Bertin, Semiology of Graphics: Diagrams, Networks, Maps

M. Bostock, V. Ogievetsky, and J. Heer, D³ Data-Driven Documents, IEEE Transactions on Visualization and Computer Graphics, vol.17, issue.12, pp.2301-2310, 2011.
DOI : 10.1109/TVCG.2011.185

S. G. Eick, M. C. Nelson, and J. D. Schmidt, Graphical analysis of computer log files, Communications of the ACM, vol.37, issue.12, pp.50-56, 1994.
DOI : 10.1145/198366.198378

J. R. Goodall and W. G. Lutters, Preserving the big picture: visual network traffic analysis with TNV, IEEE Workshop on Visualization for Computer Security, 2005. (VizSEC 05)., pp.47-54
DOI : 10.1109/VIZSEC.2005.1532065

J. Mackinlay, Tableau Public : Helping Everyone Tell Stories with Data on the Web, Analysis, 2010.

J. Mackinlay, P. Hanrahan, and C. Stolte, Show Me: Automatic Presentation for Visual Analysis, IEEE Transactions on Visualization and Computer Graphics, vol.13, issue.6, pp.1137-1144, 2007.
DOI : 10.1109/TVCG.2007.70594

A. Oliner, A. Ganapathi, and W. Xu, Advances and challenges in log analysis, Communications of the ACM, vol.55, issue.2, pp.55-61, 2012.
DOI : 10.1145/2076450.2076466

J. Stearley, S. Corwell, and K. Lord, Bridging the gaps: joining information sources with splunk, Proceedings of the 2010 workshop on Managing systems via log analysis and machine learning techniques, SLAML'10, pp.8-8, 2010.

T. Taylor, S. Brooks, and M. John, NetBytes Viewer: An Entity-Based NetFlow Visualization Utility for Identifying Intrusive Behavior
DOI : 10.1007/978-3-540-78243-8_7

T. Taylor, D. Paterson, J. Glanfield, C. Gates, S. Brooks et al., FloVis: Flow Visualization System, 2009 Cybersecurity Applications & Technology Conference for Homeland Security, pp.186-198, 2009.
DOI : 10.1109/CATCH.2009.18

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.1630

M. The and . Project, The Miso Project :: d3.chart

S. Tricaud, Picviz: Finding a needle in a haystack, Proceedings of the First UNSENIX Workshop on the Analysis of System Logs (WASL), 2008.

E. R. Tufte, Envisioning Information, 1990.

F. B. Viégas, M. Wattenberg, F. V. Ham, J. Kriss, and M. Mckeon, Many Eyes : A Site for Visualization at Internet Scale, 2007.

C. Wagner, A. Dulaunoy, S. A. Ses, and T. Engel, PeekKernelFlows, Proceedings of the Seventh International Symposium on Visualization for Cyber Security, VizSec '10, pp.0-5, 2010.
DOI : 10.1145/1850795.1850801

L. Wilkinson, The Grammar of Graphics, 1999.

G. Wills and L. Wilkinson, AutoVis: Automatic visualization, Information Visualization, vol.7, issue.1, pp.47-69, 2008.
DOI : 10.1007/s00357-003-0004-6