Fast Multidimensional Filtering for Coordinated Views ,
Analyst ' s Notebook 8 Increase the depth of intelligence for effective resource utilization ,
D³ Data-Driven Documents, IEEE Transactions on Visualization and Computer Graphics, vol.17, issue.12, pp.2301-2309, 2011. ,
DOI : 10.1109/TVCG.2011.185
A relational model of data for large shared data banks, Communications of the ACM, vol.13, issue.6, pp.377-387, 1970. ,
DOI : 10.1145/362384.362685
Graphical analysis of computer log files, Communications of the ACM, vol.37, issue.12, pp.50-56, 1994. ,
DOI : 10.1145/198366.198378
Real-time visual analytics for event data streams, Proceedings of the 27th Annual ACM Symposium on Applied Computing, SAC '12, 2012. ,
DOI : 10.1145/2245276.2245432
Visualizing Data: Exploring and Explaining Data with the Processing Environment. O'Reilly Media, 2008. ,
Interactive detection of network anomalies via coordinated multiple views, Proceedings of the Seventh International Symposium on Visualization for Cyber Security, VizSec '10, pp.91-101, 2010. ,
DOI : 10.1145/1850795.1850806
Sizing the horizon, Proceedings of the 27th international conference on Human factors in computing systems, CHI 09 ,
DOI : 10.1145/1518701.1518897
Visualizations to improve reactivity towards security incidents inside corporate networks, Proceedings of the 3rd international workshop on Visualization for computer security , VizSEC '06, pp.95-101, 2006. ,
DOI : 10.1145/1179576.1179596
ELVIS, Proceedings of the Tenth Workshop on Visualization for Cyber Security, VizSec '13, pp.9-16, 2013. ,
DOI : 10.1145/2517957.2517959
URL : https://hal.archives-ouvertes.fr/hal-00875668
Monitoring large IP spaces with ClockView, Proceedings of the 8th International Symposium on Visualization for Cyber Security, VizSec '11, pp.1-210, 2011. ,
DOI : 10.1145/2016904.2016906
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.227.7079
SnortView, Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security , VizSEC/DMSEC '04, pp.143-147, 2004. ,
DOI : 10.1145/1029208.1029232
NVisionIP, Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security , VizSEC/DMSEC '04, pp.65-72, 2004. ,
DOI : 10.1145/1029208.1029219
Closing-the-Loop in NVisionIP: Integrating Discovery and Search in Security Visualizations, Proc. of VizSEC'05, pp.75-82, 2005. ,
Flowtag, Proceedings of the 3rd international workshop on Visualization for computer security , VizSEC '06, pp.103-108, 2006. ,
DOI : 10.1145/1179576.1179597
Henry Lee's crime scene handbook. Business Weekly publications, 2003. ,
PortVis, Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security , VizSEC/DMSEC '04 ,
DOI : 10.1145/1029208.1029220
A Visualization Methodology for Characterization of Network Scans Workshop on Visualization for Computer Security, Proc. of VizSEC'05, pp.29-38, 2005. ,
Advances and challenges in log analysis, Communications of the ACM, vol.55, issue.2, pp.55-61, 2012. ,
DOI : 10.1145/2076450.2076466
Polaris: a system for query, analysis and visualization of multi-dimensional relational databases, IEEE Symposium on Information Visualization 2000. INFOVIS 2000. Proceedings, pp.5-14, 2000. ,
DOI : 10.1109/INFVIS.2000.885086
Picviz: Finding a Needle in a Haystack, Proc. of the First USENIX Workshop on the Analysis of System Logs (WASL), 2008. ,
The Grammar of Graphics, 1999. ,
AutoVis: Automatic visualization, Information Visualization, vol.7, issue.1, pp.47-69, 2008. ,
DOI : 10.1007/s00357-003-0004-6
Tool update, Proceedings of the 3rd international workshop on Visualization for computer security , VizSEC '06, pp.65-66, 2006. ,
DOI : 10.1145/1179576.1179589