S. Barnum, Standardizing cyber threat intelligence information with the structured threat information expression (stix), MITRE Corporation, vol.11, pp.1-22, 2012.

S. Barnum, R. Martin, B. Worrell, and I. Kirillov, The cybox language specification. draft, The MITRE Corporation, 2012.

J. Blatz, Csrf: Attack and defense. McAfee® Foundstone® Professional Services, 2007.

V. D. Blondel, J. L. Guillaume, R. Lambiotte, and E. Lefebvre, Fast unfolding of communities in large networks, Journal of statistical mechanics: theory and experiment, issue.10, p.10008, 2008.
URL : https://hal.archives-ouvertes.fr/hal-01146070

A. Cassandra, Apache cassandra. Website, p.13, 2014.

A. Clauset, M. E. Newman, and C. Moore, Finding community structure in very large networks, Physical review E, vol.70, issue.6, p.66111, 2004.

J. François, S. Wang, and T. Engel, Bottrack: tracking botnets using netflow and pagerank, International Conference on Research in Networking, pp.1-14, 2011.

A. Gharib, I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, An evaluation framework for intrusion detection dataset, Information Science and Security (ICISS), 2016 International Conference on, pp.1-6, 2016.

E. Glatz, S. Mavromatidis, B. Ager, and X. Dimitropoulos, Visualizing big network traffic data using frequent pattern mining and hypergraphs, Computing, vol.96, issue.1, pp.27-38, 2014.

A. Goel, K. Po, K. Farhadi, Z. Li, and E. De-lara, The taser intrusion recovery system, ACM SIGOPS Operating Systems Review, vol.39, pp.163-176, 2005.

M. N. Hossain, S. M. Milajerdi, J. Wang, B. Eshete, R. Gjomemo et al., Sleuth: Realtime attack scenario reconstruction from cots audit data, Proc. USENIX Secur, pp.487-504, 2017.

J. Jiang, J. Chen, K. K. Choo, C. Liu, K. Liu et al., A visualization scheme for network forensics based on attribute oriented induction based frequent item mining and hyper graph, International Conference on Digital Forensics and Cyber Crime, pp.130-143, 2017.

C. Johnson, M. Badger, D. Waltermire, J. Snyder, and C. Skorupka, Guide to cyber threat information sharing, 2016.

S. T. King and P. M. Chen, Backtracking intrusions, ACM SIGOPS Operating Systems Review, vol.37, pp.223-236, 2003.

S. Kobayashi, K. Fukuda, and H. Esaki, Mining causes of network events in log data with causal inference, Proc. IEEE IM, vol.17, pp.45-53, 2017.

S. Lagraa, J. François, A. Lahmadi, M. Miner, C. Hammerschmidt et al., Botgm: Unsupervised graph mining to detect botnets in traffic flows, 2017 1st Cyber Security in Networking Conference (CSNet), pp.1-8, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01636480

F. Mansman, L. Meier, and D. A. Keim, Visualization of host behavior for network security, pp.187-202, 2007.

S. M. Milajerdi, R. Gjomemo, B. Eshete, R. Sekar, and V. Venkatakrishnan, Holmes: real-time apt detection through correlation of suspicious information flows, 2018.

J. Mothe, K. Mkhitaryan, and M. Haroutunian, Community detection: Comparison of state of the art algorithms, pp.125-129, 2017.
URL : https://hal.archives-ouvertes.fr/hal-02641009

S. Nagaraja, P. Mittal, C. Y. Hong, M. Caesar, and N. Borisov, Botgrep: Finding p2p bots with structured graph analysis, USENIX Security Symposium, vol.10, pp.95-110, 2010.

M. E. Newman, Fast algorithm for detecting community structure in networks, Physical review E, vol.69, issue.6, p.66133, 2004.

C. Onwubiko, Cocoa: An ontology for cybersecurity operations centre analysis process, 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), pp.1-8, 2018.

V. Paxson, Bro: a system for detecting network intruders in realtime, Computer networks, vol.31, pp.2435-2463, 1999.

K. Pei, Z. Gu, B. Saltaformaggio, S. Ma, F. Wang et al., Hercule: Attack story reconstruction via community discovery on correlated log graph, Proceedings of the 32Nd Annual Conference on Computer Security Applications, pp.583-595, 2016.

P. Pons and M. Latapy, Computing communities in large networks using random walks, International symposium on computer and information sciences, pp.284-293, 2005.

U. N. Raghavan, R. Albert, and S. Kumara, Near linear time algorithm to detect community structures in large-scale networks, Physical review E, vol.76, issue.3, p.36106, 2007.

M. A. Rodriguez, The gremlin graph traversal machine and language, Proceedings of the 15th Symposium on Database Programming Languages, pp.1-10, 2015.

M. Rosvall and C. T. Bergstrom, Maps of random walks on complex networks reveal community structure, Proceedings of the National Academy of Sciences, vol.105, issue.4, pp.1118-1123, 2008.

I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, Toward generating a new intrusion detection dataset and intrusion traffic characterization, ICISSP. pp, pp.108-116, 2018.

A. Sharp,

V. A. Traag and J. Bruggeman, Community detection in networks with positive and negative links, Physical Review E, vol.80, issue.3, p.36115, 2009.

C. Xosanavongsa, E. Totel, and O. Bettan, Discovering correlations: A formal definition of causal dependency among heterogeneous events, 2019 IEEE European Symposium on Security and Privacy (EuroS&P), pp.340-355, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02363431

Z. Xu, Z. Wu, Z. Li, K. Jee, J. Rhee et al., High fidelity data reduction for big data security dependency analyses, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp.504-516, 2016.