S. Abraham and S. Nair, A predictive framework for cyber security analytics using attack graphs, International Journal of Computer Networks & Communications, 2015.

L. Allodi and F. Massacci, A preliminary analysis of vulnerability scores for attacks in wild: The ekits and sym datasets, Proceedings of the 2012 ACM Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, vol.12, pp.17-24, 2012.

F. Arnold, H. Hermanns, R. Pulungan, and M. Stoelinga, Time-dependent analysis of attacks, Principles of Security and Trust, vol.8414, pp.285-305, 2014.

F. Benali, S. Ubéda, and V. Legrand, Collaborative approach to automatic classification of heterogeneous information security, Emerging Security Information, Systems and Technologies, pp.294-299, 2008.
URL : https://hal.archives-ouvertes.fr/inria-00383185

S. Camtepe and B. Yener, Modeling and detection of complex attacks, Se-cureComm Third International Conference on Security and Privacy in Communications Networks and the Workshops, pp.234-243, 2007.

B. Chen, J. Lee, and A. S. Wu, Active event correlation in bro ids to detect multistage attacks, Fourth IEEE International Workshop on Information Assurance (IWIA'06), pp.16-50, 2006.

P. Chen, L. Desmet, and C. Huygens, A study on advanced persistent threats, Communications and Multimedia Security, vol.8735, pp.63-72, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01404186

T. M. Chen and S. Abu-nimeh, Lessons from stuxnet, Computer, vol.44, issue.4, pp.91-93, 2011.

M. Coudriau, A. Lahmadi, and J. Francois, Topological Analysis and Visualisation of Network Monitoring Data: Darknet case study, International Workshop on Information Forensics and Security (WIFS), 2016.
URL : https://hal.archives-ouvertes.fr/hal-01403950

Z. Cui, I. Herwono, and P. Kearney, Multi-stage attack modelling, Proceedings of Cyberpatterns 2013, pp.78-89, 2013.

G. De-santis, A. Lahmadi, J. Francois, and O. Festor, Modeling of ip scanning activities with hidden markov models: Darknet case study, 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp.1-5, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01404127

O. Flåten and M. S. Lund, How good are attack trees for modelling advanced cyber threats?, Norwegian Information Security Conference (NISK), vol.7, 2014.

I. Friedberg, F. Skopik, G. Settanni, and R. Fiedler, Combating advanced persistent threats: From network event correlation to incident detection, Comput. Secur, vol.48, pp.35-57, 2015.

P. Giura and W. Wang, Using large scale distributed computing to unveil advanced persistent threats, SCIENCE, vol.1, issue.3, p.93, 2013.

B. Kordy, L. Piètre-cambacèdés, and P. Schweitzer, Dag-based attack and defense modeling: Don't miss the forest for the attack trees, Computer science review 13-14, pp.1-38, 2014.

I. Kotenko and A. Chechulin, A cyber attack modeling and impact assessment framework, 2013 5th International Conference on Cyber Conflict, pp.1-24, 2013.

S. Lagraa, V. Legrand, and M. Minier, Behavioral change-based anomaly detection in computer networks using data mining, Int. J. Network Manage

Q. Le and T. Mikolov, Distributed representations of sentences and documents, Proceedings of the 31st International Conference on Machine Learning (ICML-14). pp. 1188-1196. JMLR Workshop and Conference Proceedings, 2014.

V. Legrand, R. State, and L. Paffumi, A dangerousness-based investigation model for security event management, Internet Monitoring and Protection, 2008. ICIMP'08. The Third International Conference on, pp.109-118, 2008.
URL : https://hal.archives-ouvertes.fr/hal-00405369

V. Legrand and S. Ubeda, Enriched diagnosis and investigation models for security event correlation, Internet Monitoring and Protection, pp.1-1, 2007.
URL : https://hal.archives-ouvertes.fr/inria-00383174

V. Legrand, Confiance et risque pour engager un ?change en milieu hostile, 2013.

M. Marchetti, M. Colajanni, and F. Manganiello, Identification of correlated network intrusion alerts, Third International Workshop on Cyberspace Safety and Security (CSS), pp.15-20, 2011.

S. Mathew and S. Upadhyaya, Attack scenario recognition through heterogeneous event stream analysis, IEEE Military Communications Conference (MILCOM), pp.1-7, 2009.

J. Navarro-lara, A. Deruyver, and P. Parrend, Morwilog: an ACO-based system for outlining multi-step attacks, IEEE Symposium Series on Computational Intelligence (SSCI), 2016.

M. Offroy and L. Duponchel, Topological data analysis: A promising big data exploration tool in biology, analytical chemistry and physical chemistry, Analytica Chimica Acta, vol.910, pp.1-11, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01285628

P. Pearson, D. Muellner, and G. Singh, TDAmapper: Analyze High-Dimensional Data Using Discrete Morse Theory, 2015.

R. ?eh??ek and P. Sojka, Software Framework for Topic Modelling with Large Corpora, Proceedings of the LREC 2010 Workshop on New Challenges for NLP Frameworks, pp.45-50, 2010.

N. Scarabeo, B. C. Fung, and R. H. Khokhar, Mining known attack patterns from security-related events, PeerJ Computer Science, vol.1, p.25, 2015.

B. Schneider, Attack trees. Dr. Dobb's, Journal, 1999.

A. K. Sood and R. J. Enbody, Targeted cyberattacks: A superset of advanced persistent threats, IEEE Security & Privacy, vol.11, issue.1, pp.54-61, 2013.

L. Wang, A. Ghorbani, and Y. Li, Automatic multi-step attack pattern discovering, International Journal of Network Security (IJNS), vol.10, issue.2, pp.142-152, 2010.

Z. Zali, M. R. Hashemi, and H. Saidi, Real-time attack scenario detection via intrusion detection alert correlation, 9th International ISC Conference on Information Security and Cryptology (ISCISC), pp.95-102, 2012.

S. Zhang, D. Caragea, and X. Ou, An empirical study on using the national vulnerability database to predict software vulnerabilities, Proceedings of the 22Nd International Conference on Database and Expert Systems Applications -Volume Part I, vol.11, pp.217-231, 2011.

L. Zhaowen, L. Shan, and M. Yan, Real-time intrusion alert correlation system based on prerequisites and consequence, 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM). pp. 1-5. IEEE, Chengdu City, 2010.