S. Garcia, Malware Capture Facility Project, 2017.

L. Girardin and D. Brodbeck, A visual approach for monitoring logs, LISA, pp.299-308, 1998.

C. Humphries, N. Prigent, C. Bidan, and F. Majorczyk, CORGI, Proceedings of the Eleventh Workshop on Visualization for Cyber Security, VizSec '14, pp.57-64, 2014.
DOI : 10.1057/ivs.2008.27

URL : https://hal.archives-ouvertes.fr/hal-01096331

S. G. Kobourov, Force-directed drawing algorithms, 2004.

S. G. Kobourov, Spring embedders and force directed graph drawing algorithms. arXiv preprint, 2012.

M. Krzywinski, 15-color palettes for color blindess, 2017.

. Mandiant, The OpenIOC Framework, 2017.

V. Paxson, The Bro Network Security Monitor, 2017.

K. Pei, Z. Gu, B. Saltaformaggio, S. Ma, F. Wang et al., HERCULE, Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC '16, pp.583-595, 2016.
DOI : 10.1145/2590296.2590309