. Résumé-Étendu-:-alexandre, T. Kabil, N. Duval, G. Cuppens, Y. Le-comte et al., Why should we use 3D Collaborative Virtual Environments for Cyber Security, IEEE Fourth VR International Workshop on Collaborative Virtual Environments (IEEEVR 2018), 2018.

A. Long-:-alexandre, T. Kabil, N. Duval, G. Cuppens, Y. Le-comte et al., From Cyber Security Activities to Collaborative Virtual Environments Practices through the 3D CyberCOP Platform, International Conference on Information Systems Security, pp.272-287, 2018.

A. Long-:-alexandre, T. Kabil, N. Duval, G. Cuppens, Y. Le-comte et al., 3D CyberCOP : a Collaborative Platform for Cybersecurity Data Analysis and Training. 15th International Conference on Cooperative Design, Visualization and Engineering, pp.176-183, 2018.

F. Article-collectif-:-simon-foley, E. Autrel, T. Bourget, S. Cledel, and . Grunenwald, Science hackathons for cyberphysical system security research : putting CPS tesdbed platforms to good use, Workshop on Cyber-Physical Systems Security and Privacy, vol.2018, pp.102-107, 2018.

P. Abel, P. Gros, C. Santos, D. Loisel, and J. Paris, Automatic construction of dynamic 3d metaphoric worlds : An application to network management, Visual Data Exploration and Analysis VII, t. 3960, International Society for Optics et Photonics, p.35, 2000.

J. M. Ahrend, M. Jirotka, and K. Jones, On the collaborative practices of cyber threat intelligence analysts to develop and utilize tacit Threat and Defence Knowledge, 2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA), juin 2016, vol.30, p.29

M. Ask, P. Bondarenko, J. E. Rekdal, and A. Nordbø, Pieter Bloemerus et Dmytro Piatkivskyi, « Advanced persistent threat (APT) beyond the hype, Project Report in IMT4582 Network Security at GjoviN University College, p.79, 2013.

R. Aylett and S. Louchart, Towards a narrative theory of virtual reality, vol.7, p.50, 2003.

C. Barot, « Scénarisation d'environnements virtuels. Vers un équilibre entre contrôle, cohérence et adaptabilité. », thèse de doct, p.64, 2014.

T. Bass, « Multisensor data fusion for next generation distributed intrusion detection systems, Proceedings of the IRIS National Symposium on Sensor and Data Fusion, t. 24, 28, Citeseer, vol.15, p.14, 1999.

M. Billinghurst and M. Cordeil, Anastasia Bezerianos et Todd Margolis, « Collaborative immersive analytics, vol.62, p.61, 2018.

C. Bossard, G. Kermarrec, C. Buche, and J. Tisseau, « Transfer of learning in virtual environments : a new challenge ?, Virtual Reality, vol.12, p.64, 2008.

R. Bouville, Interopérabilité des environnements virtuels 3D : modèle de réconciliation des contenus et des composants logiciels, p.53, 2012.

J. Boyd, « A discourse on winning and losing [Briefing slides] », in : Maxwell Air Force Base, p.11, 1987.

M. Jeffrey, M. Bradshaw, L. Carvalho, T. Bunch, . Eskridge et al., Social Informatics, and Telecommunications Engineering) Transactions of Security and Safety. Special section on The Cognitive Science of Cyber Defense Analysis, vol.21, p.20, 2012.

J. Brooke, SUS-A quick and dirty usability scale, vol.194, p.137, 1996.

C. Buche, R. Querrec, P. De-loor, and P. Chevaillier, Mascaret : A pedagogical multi-agent system for virtual environments for training, International Journal of Distance Education Technologies (IJDET), vol.2, issue.4, p.64, 2004.

W. Büschel, J. Chen, R. Dachselt, S. Drucker, T. Dwyer et al., Chris North et Wolfgang Stuerzlinger, « Interaction for immersive analytics, p.59, 2018.

S. Butscher, S. Hubenschmid, and J. Müller, Johannes Fuchs et Harald Reiterer, « Clusters, trends, and outliers : How immersive technologies can facilitate the collaborative analysis of multidimensional data, Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, vol.62, p.61, 2018.

Y. Cardin, analyse de l'activité comme préalable à la conception d'un environnement virtuel de formation. Le cas d'une formation à la gestion d'incendies en milieu urbain chez les sapeurs-pompiers, UBO, vol.76, p.64, 2016.

J. Casarin, N. Pacqueriaud, and D. Bechmann, UMI3D : A Unity3D Toolbox to Support CSCW Systems Properties in Generic 3D User Interfaces », vol.2, p.55, 2018.

T. Chandler, M. Cordeil, T. Czauderna, T. Dwyer, J. Glowacki et al., Big Data Visual Analytics (BDVA), p.61, 2015.

S. Chen, C. Guo, X. Yuan, F. Merkle, H. Schaefer et al., Online collaborative explorative analysis on network security, Proceedings of the Eleventh Workshop on Visualization for Cyber Security, vol.32, p.31, 2014.

F. Elizabeth, D. Churchill, and . Snowdon, « Collaborative virtual environments : an introductory review of issues and systems, Virtual Reality, vol.3, issue.1, p.54, 1998.

G. Claude, V. Gouranton, and B. Arnaldi, Roles in collaborative virtual environments for training, p.65, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01199738

P. Coiffet, Mondes imaginaires : les arcanes de la réalité virtuelle, p.51, 1995.

D. Benjamin, C. E. Cone, M. F. Irvine, T. D. Thompson, and «. Nguyen, Video Game for Cyber Security Training and Awareness, Comput. Secur, vol.26, issue.1, p.41

G. Conti, J. Nelson, and D. Raymond, Cyber Conflict (CyCon), 2013 5th International Conference on, vol.31, p.12, 2013.

M. Cordeil, A. Cunningham, T. Dwyer, H. Bruce, K. Thomas et al., Immersive axes as embodied affordances for interactive multivariate data visualisation, Proceedings of the 30th Annual ACM Symposium on User Interface Software and Technology, p.61, 2017.

J. Cormier, « Mobiliser une analyse de l'activité comme aide à la conception et à l'évaluation d'un Environnement Virtuel pour l'Apprentissage Humain : un exemple en implantologie dentaire, p.64, 2012.

B. Cowley, D. Charles, M. Black, and R. Hickey, Toward an understanding of flow in video games, vol.6, p.64, 2008.

D. Crémilleux and C. Bidan, Frédéic Majorczyk et Nicolas Prigent, « Enhancing Collaboration Between Security Analysts in Security Operations Centers, International Conference on Risks and Security of Internet and Systems, p.159, 2018.

D. Anita and . Whitley, The real work of computer network defense analysts, p.23, 2007.

D. Mellet-d'huart and «. Virtual, Environment for training : An art of enhancing reality, p.64, 2002.

A. Damico, L. Buchanan, D. Kirkpatrick, and P. Walczak, Cyber Operator Perspectives on Security Visualization, vol.184, p.77, 2016.

E. Vries, Les logiciels d'apprentissage : panoplie ou éventail ? », in : Revue française de pédagogie, p.63, 2001.

B. Denis and . Méditations, , p.49, 2004.

E. Dorothy and . Denning, « An intrusion-detection model, IEEE Transactions on software engineering, vol.2, p.14, 1987.

M. Dodge and R. Kitchin, Atlas of cyberspace, t, vol.158, p.57, 2001.

C. Donalek, « Immersive and collaborative data visualization using virtual reality platforms, 2014 IEEE International Conference on Big Data (Big Data), p.61, 2014.

S. Dübel and M. Röhlig, Heidrun Schumann et Matthias Trapp, « 2D and 3D presentation of spatial data : A systematic review, 2014 IEEE VIS International Workshop on 3DVis (3DVis), p.57, 2014.

T. Duval, C. Fleury, B. Nouailhas, and L. Aguerreche, « Collaborative exploration of 3d scientific data, Proceedings of the 2008 ACM symposium on Virtual reality software and technology, p.61, 2008.

R. Mica and . Endsley, Measurement of situation awareness in dynamic systems, Human factors, vol.37, p.12, 1995.

. Mica-r-endsley, S. Erik, and . Connors, Cyber Defense and Situational Awareness, p.19, 2014.

M. Esteve, I. Pérez, C. Palau, F. Carvajal, J. Hingant et al., Cyber Common Operational Picture : A Tool for Cyber Hybrid Situational Awareness Improvement, vol.33, p.31, 2016.

E. Renée, . Etoty, F. Robert, and . Erbacher, A survey of visualization tools assessed for anomaly-based intrusion detection analysis, rapp. tech, ARMY RESEARCH LAB ADELPHI MD COMPUTATIONAL et INFORMATION SCIENCES DI-RECTORATE, vol.28, p.27, 2014.

A. Evesti, T. Kanstrén, and T. Frantti, 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), p.85, 2017.

V. Ford and A. Siraj, Ada Haynes et Eric Brown, « Capture the flag unplugged : an offline cyber competition, Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, p.40, 2017.

P. Fuchs and L. , Presses des MINES, p.48, 2006.

R. J. Garca-hernandez and C. Anthes, Markus Wiedemann et Dieter Kranzlmuller, « Perspectives for using virtual reality to extend visual data mining in information visualization, 2016 IEEE Aerospace Conference, p.57, 2016.

S. Gerbaud, N. Mollet, and B. Arnaldi, Virtual environments for training : from individual learning to collaboration with humanoids », in : International Conference on Technologies for E-Learning and Digital Entertainment, p.65, 2007.

S. Gerbaud, N. Mollet, F. Ganier, B. Arnaldi, J. Tisseau et al., 2008 IEEE Virtual Reality Conference, p.64, 2008.

A. Nicklaus and . Giacobe, Application of the JDL data fusion process model for cyber security, International Society for Optical Engineering (SPIE), t. 7710, p.16, 2010.

W. Gibson, J. Bonnefoy, . Neuromancien, J. Éditions, and . Lu, , p.57, 1985.

V. Steven-r-gomez, D. Mancuso, and . Staheli, Considerations for Human-Machine Teaming in Cybersecurity, p.20, 2019.

M. Granåsen and . Dennis-andersson, Measuring team effectiveness in cyber-defense exercises : a cross-disciplinary case study, Cognition, Technology & Work, vol.18, p.39, 2016.

P. Gros, D. Abel, D. Santos, N. Loisel, . Trichaud et al., Experimenting service-oriented 3D metaphors for managing networks using virtual reality, Laval Virtual-Virtual Reality International Conference, p.35, 2000.

R. Gutzwiller, Situation Awareness in Defensive Cyberspace Operations : An Annotated Bibliographic Assessment Through, rapp. tech., NIWC Pacific San Diego United States, vol.27, p.21, 2015.

R. Hackathorn and T. Margolis, Immersive analytics : Building virtual data worlds for collaborative decision support, p.61, 2016.

M. Cristin, . Hall, A. H. Sonya, D. L. Mcmullen, . Hall et al., « Perspectives on visualization and virtual world technologies for multi-sensor data fusion », in : Information Fusion, 11th International Conference on, p.34, 2008.

J. Hamari, J. Koivisto, and H. Sarsa, Does Gamification Work ?-A Literature Review of Empirical Studies on Gamification. », in : HICSS, t. 14, p.64, 2014.

B. Péter, H. Csaba, and K. , Prerequisites of Virtual Teamwork in Security Operations Centers : Knowledge, Skills, Abilities and Other Characteristics, vol.76, p.89, 2017.

W. Harrop and G. Armitage, Real-time Collaborative Network Monitoring and Control Using 3D Game Engines for Representation and Interaction, pp.31-40, 2006.

C. Hoareau, R. Querrec, and F. Ganier, Recommandations ergonomiques pour le guidage de l'apprenant en EVAH, p.64, 2015.
URL : https://hal.archives-ouvertes.fr/hal-02505825

D. Inoue, M. Eto, K. Suzuki, M. Suzuki, K. Nakao et al., Novel Real-time 3D Visualization for Darknet Monitoring-based Alert System, Proceedings of the Ninth International Symposium on Visualization for Cyber Security, VizSec '12, p.36, 2012.

J. Jerald, The VR book : Human-centered design for virtual reality, p.51, 2015.

W. , J. Rickel, and «. Steve, An animated pedagogical agent for procedural training in virtual environments, ACM SIGART Bulletin, vol.8, issue.1-4, p.65, 1997.

A. Kabil, T. Duval, N. Cuppens, G. Le-comte, Y. Halgand et al., 15th International Conference on Cooperative Design, Visualization and Engineering, sous la dir. d'Yuhua Luo, Cooperative Design, Visualization, and Engineering, pp.176-183, 2018.

A. Kabil, T. Duval, N. Cuppens, G. Le-comte, Y. Halgand et al., International Conference on Information Systems Security, proceedings of ICISS 2018, 14th International Conference on Information Systems Security, Bengaluru, India, déc, pp.272-287, 2018.

A. Kabil, T. Duval, N. Cuppens, G. Le-comte, Y. Halgand et al., « Why should we use 3D Collaborative Virtual Environments for Cyber Security ?, IEEE Fourth VR International Workshop on Collaborative Virtual Environments, 2018.

J. Keiriz, O. Ajilore, A. D. Leow, G. Angus, and . Forbes, Proceedings of the IEEE VIS Workshop on Immersive Analytics, p.61, 2017.

C. Kelleher and T. Wagener, « Ten guidelines for effective data visualization in scientific publications, Environmental Modelling & Software, vol.26, p.57, 2011.

T. Kokkonen, « Architecture for the Cyber Security Situational Awareness System, International Conference on Next Generation Wired/Wireless Networking, p.16, 2016.

A. Korzybski, Une carte n'est pas le territoire : prolégomènes aux systèmes non-aristotéliciens et à la sémantique générale, Éditions de l'Éclat, p.57, 1998.

M. Kraus, N. Weiler, A. Daniel, A. Keim, B. Diehl et al., Visualization in the VR-Canvas : How much Reality is Good for Immersive Analytics in Virtual Reality ? », in : 2nd Workshop on the Creation, Curation, Critique and Conditioning of Principles and Guidelines in Visualization at IEEE VIS, p.61, 2018.

K. Kullman, N. B. Asher, and C. Sample, Operator Impressions of 3D Visualizations for Cybersecurity Analysts, p.36, 2019.

K. Kullman, J. Cowley, and N. Ben-asher, ICCWS 2018 13th International Conference on Cyber Warfare and Security, Academic Conferences et publishing limited, p.36, 2018.

C. Oh-hyun-kwon, K. Muelder, . Lee, -. Kwan, and . Ma, « A study of layout, rendering, and interaction methods for immersive graph visualization, IEEE transactions on visualization and computer graphics, vol.22, p.63, 2016.

L. Laaperi and J. Vankka, Architecture for a system providing a common operating picture of critical infrastructure, 2015 IEEE International Symposium on, p.16, 2015.

B. Laha, K. Sensharma, J. D. Schiffbauer, and D. A. Bowman, « Effects of Immersion on Visual Analysis of Volume Data, IEEE Transactions on Visualization and Computer Graphics, vol.18, p.57

O. M. Latvala, T. Keränen, S. Noponen, N. Lehto, M. Sailio et al., « Visualizing network events in a muggle friendly way, 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment, vol.37, p.36, 2017.

R. Lengler, J. Martin, and . Eppler, Towards a periodic table of visualization methods for management, IASTED Proceedings of the Conference on Graphics and Visualization in Engineering, vol.60, p.59, 2007.

P. Lévy and &. Qu, Éditions La Découverte, vol.57, p.46, 1995.

Y. Li-et-mengjun-xie and «. Platoon, A Virtual Platform for Team-oriented Cybersecurity Training and Exercises, Proceedings of the 17th Annual Conference on Information Technology Education, ACM, p.38, 2016.

T. Lopez, P. Chevaillier, V. Gouranton, P. Evrard, F. Nouviale et al., Rozenn Bouville et Bruno Arnaldi, « Collaborative virtual training with physical and communicative autonomous agents, Computer Animation and Virtual Worlds, vol.25, p.65, 2014.

D. Lourdeaux, « Réalité virtuelle et formation : conception d'environnements virtuels pédagogiques, p.63, 2001.

D. Lourdeaux, P. Fuchs, and J. Burkhardt, « An intelligent tutorial agent for training virtual environments, p.65, 2002.

R. Luh, S. Marschalek, and M. Kaiser, Helge Janicke et Sebastian Schrittwieser, « Semantics-aware detection of targeted attacks : a survey, Journal of Computer Virology and Hacking Techniques, vol.13, p.79, 2017.

M. Marchetti, F. Pierazzi, A. Guido, and M. Colajanni, « Countering Advanced Persistent Threats through security intelligence and big data analytics, 2016 8th International Conference on Cyber Conflict (Cy-Con), p.79, 2016.

K. Marriott, J. Chen, M. Hlawatsch, T. Itoh, M. A. Nacenta et al., Immersive Analytics : Time to Reconsider the Value of 3D for Information Visualisation

N. Klein, T. Henry-riche, W. Itoh, . Stuerzlinger, H. Bruce et al., , vol.58, p.57, 2018.

K. Marriott, F. Schreiber, T. Dwyer, K. Klein, N. Henry-riche et al., Immersive Analytics, t. 11190, p.61, 2018.

R. Marty, Applied security visualization, Addison-Wesley Upper Saddle River, vol.26, p.25, 2009.

S. Mäses, L. Randmann, O. Maennel, B. Lorenz, and «. Stenmap, Framework for Evaluating Cybersecurity-Related Skills Based on Computer Simulations », in : Learning and Collaboration Technologies, p.39, 2018.

B. Mcguinness and L. Foy, Proceedings of the first human performance, situation awareness, and automation conference, vol.16, p.17, 2000.

S. Mckenna, D. Staheli, and M. Meyer, « Unlocking user-centered design methods for building cyber security visualizations, Visualization for Cyber Security (VizSec), 2015 IEEE Symposium on, vol.89, p.76, 2015.

W. Mees and . Thibault-debatty, « An attempt at defining cyberdefense situation awareness in the context of command & control, Military Communications and Information Systems (ICMCIS), 2015 International Conference on, p.11, 2015.

M. C. Michel, N. P. Helmick, and L. M. Mayron, 2011 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), fév, p.34, 2011.

M. Savita-mohurle and . Patil, A brief study of wannacry threat, vol.8, p.79, 2017.

J. Murphy, E. Sihler, M. Ebben, L. Lovewell, and G. Wilson, The Steering Committee of The World Congress in Computer Science, Proceedings of the International Conference on Security and Management (SAM), p.38, 2014.

A. Nagarajan, J. M. Allbeck, A. Sood, and T. L. Janssen, Exploring game design for cybersecurity training, 2012 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER), mai 2012, p.41

K. Nance, B. Hay, R. Dodge, A. Seazzu, and S. Burd, Virtual laboratory environments : Methodologies for educating cybersecurity researchers, vol.4, p.38, 2009.

O. Nannipieri and P. Fuchs, Pour en finir avec La Réalité : une approche socio-constructiviste de la réalité virtuelle, Revue des Interactions Humaines Médiatisées (RIHM), vol.10, p.47, 2009.

H. Nguyen, P. Marendy, and U. Engelke, Collaborative framework design for immersive analytics, p.61, 2016.

O. Patrick, S. Leary, A. Jhaveri, W. Chaudhary, K. Sherman et al., James Money et Sandy McKenzie, « Enhancements to VTK enabling scientific visualization in immersive environments, Virtual Reality (VR), p.59, 2017.

C. Onwubiko, Understanding cyber situation awareness, Int. J. Cyber Situat. Aware, vol.20, p.17, 2016.

T. Pahi, M. Leitner, and F. Skopik, Analysis and Assessment of Situational Awareness Models for National Cyber Security Centers, p.13, 2017.

. Mb-parish and . Madahar, Understanding Cyberspace Through Cyber Situational Awareness, p.12, 2016.

L. Pierre and . Cyberculture, , vol.47, p.46, 1997.

R. Querrec, C. Buche, E. Maffre, and P. Chevaillier, « Sé-cuRéVi : virtual environments for fire-fighting training, 5th virtual reality international conference (VRIC'03), p.64, 2003.

. Kjetil-raaen-et-ivar and . Kjellmo, International Conference on Entertainment Computing, p.51, 2015.

N. Prashanth-rajivan and . Cooke, Theory and Models for Cyber Situation Awareness, sous la dir, Impact of Team Collaboration on Cybersecurity Situational Awareness, vol.29, p.27, 2017.

A. Sethi and G. Wills, Expert-interviews led analysis of EEVi -A model for effective visualization in cyber-security, 2017 IEEE Symposium on Visualization for Cyber Security (VizSec), vol.25, p.24, 2017.

A. Sethi, F. Paci, and G. Wills, EEVi-framework for evaluating the effectiveness of visualization in cyber-security, 11th International Conference for Internet Technology and Secured Transactions (ICITST), vol.76, p.23, 2016.

A. Shah and R. Ganesan, Sushil Jajodia et Hasan Cam, « A methodology to measure and monitor level of operational effectiveness of a CSOC, International Journal of Information Security, vol.17, p.74, 2018.

H. Shiravi, A. Shiravi, A. Ali, and . Ghorbani, A survey of visualization systems for network security, IEEE Transactions on visualization and computer graphics, vol.18, p.29, 2012.

R. Sicat, J. Li, J. Choi, M. Cordeil, W. Jeong et al., A toolkit for building immersive data visualizations, IEEE transactions on visualization and computer graphics, vol.25, p.59, 2018.

S. Singh, P. Sharma, D. Seo-yeon-moon, J. Moon, and . Park, A comprehensive study on APT attacks and countermeasures for future networks and communications : challenges and solutions, p.79, 2016.

M. Slater, «. A-note-on-presence, and . Terminology, Presence connect, vol.3, p.49, 2003.

D. Staheli, T. Yu, R. J. Crouser, S. Damodaran, K. Nam et al., Proceedings of the Eleventh Workshop on Visualization for Cyber Security, VizSec '14, pp.49-56, 2014.

G. Suba?u, L. Ro?u-et-ion, and . B?doi, « Modeling and simulation architecture for training in cyber defence education, 2017 9th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), vol.38, p.37, 2017.

J. Sathya-chandran-sundaramurthy, T. Case, and . Truong, Loai Zomlot et Marcel Hoffmann, « A tale of three security operation centers, Proceedings of the 2014 ACM workshop on security information workers, p.76, 2014.

J. Sathya-chandran-sundaramurthy, X. Mchugh, M. Ou, . Wesch, and G. Alexandru, Bardas et S. Raj Rajagopalan, « Turning Contradictions into Innovations or : How We Learned to Stop Whining and Improve Security Operations, Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), vol.85, p.76, 2016.

P. George, . Tadda, S. John, and . Salerno, Overview of cyber situation awareness, vol.22, p.21, 2010.

C. Taylor, P. Arias, J. Klopchic, C. Matarazzo, E. Dube et al., State-of-the-Art and Building the Next Generation, 2017 USENIX Workshop on Advances in Security Education (ASE 17, vol.40, p.39, 2017.

T. Katy, C. Olivier, E. Loup-escande, and S. Richir, Proposition and Validation of a Questionnaire to Measure the User Experience in Immersive Virtual Environments, The International Journal of Virtual Reality, vol.16, pp.33-48, 2016.

J. Tisseau, . Réalité-virtuelle, and . Complexité, Expérimentation in virtuo des systemes complexes. Manifeste scientifique du Centre Européen de Réalité Virtuelle, p.47, 2004.

J. Tisseau and . Réalité-virtuelle, Habilitationa diriger des recherches, vol.1, p.49, 2001.

A. Torres, « Building a World-Class Security Operations Center : A Roadmap, vol.72, p.70, 2015.

M. Tyworth, A. Nicklaus, V. Giacobe, C. Mancuso, and . Dancy, « The distributed nature of cyber situation awareness, Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), 2012 IEEE International Multi-Disciplinary Conference on, p.20, 2012.

M. Varga, C. Winkelholz, and S. Träber-burdin, Cyber Security Science and Engineering, vol.24, p.23, 2016.

M. Varga, C. Winkelholz, and S. Träber-burdin, The Application of Visual Analytics to Cyber Security, p.23, 2017.

J. Filho, C. M. Dal-sasso-freitas, L. Nedel, and «. Virtualdesk, Computer Graphics Forum, t, vol.37, p.61, 2018.

B. Wang and K. Mueller, « Does 3D really make sense for visual cluster analysis ? yes ! », in : 3DVis (3DVis), IEEE VIS International Workshop on, p.57, 2014.

W. Winn, Technical Publication R-93-9, p.63, 1993.

D. Zeltzer and . Autonomy, Presence : Teleoperators & Virtual Environments, vol.1, p.49, 1992.

Z. Huang, C. Shen, S. Doshi, N. Thomas, and H. Duong, « Fuzzy sets based team decision-making for Cyber Situation Awareness, MILCOM 2016 -2016 IEEE Military Communications Conference, p.21, 2016.

C. Zhong, A. Alnusair, B. Sayger, A. Troxell, J. Yao et al., 2019 IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA), vol.32, p.31, 2019.

C. Zhong, J. Yen, P. Liu, R. F. Erbacher, C. Garneau et al., Theory and Models for Cyber Situation Awareness, sous la dir. de Peng Liu, Sushil Jajodia et Cliff Wang, vol.17, p.14, 2017.

Z. Zhong, Y. Zhao, R. Shi, Y. Sheng, and J. Liu, Hua Meng et Dan Lin, « A user-centered multi-space collaborative visual analysis for cyber security, Chinese Journal of Electronics, vol.27, p.33, 2018.

F. Zhou, W. Huang, Y. Zhao, and Y. Shi, Xing Liang et Xiaoping Fan, « Entvis : a visual analytic tool for entropy-based network traffic anomaly detection, IEEE computer graphics and applications, vol.35, p.29, 2015.

Y. Zhu, « Introducing google chart tools and google maps api in data visualization courses, IEEE computer graphics and applications, vol.32, issue.6, p.59, 2012.

C. Zimmerman, « Ten strategies of a world-class cybersecurity operations center, MITRE corporate communications and public affairs, vol.73, 2014.

M. Zyda, Networked virtual environments : design and implementation, vol.54, p.52, 1999.