J. Brooke, Sus-a quick and dirty usability scale, Usability evaluation in industry, vol.189, pp.4-7, 1996.

J. Casarin, N. Pacqueriaud, and D. Bechmann, Umi3d: A unity3d toolbox to support cscw systems properties in generic 3d user interfaces, Proc. ACM Hum.-Comput. Interact, vol.2, issue.20, pp.1-29, 2018.

A. Damico, L. Buchanan, D. Kirkpatrick, and P. Walczak, Cyber operator perspectives on security visualization, Advances in Human Factors in Cybersecurity, pp.69-81, 2016.

A. Evesti, T. Kanstrén, and T. Frantti, Cybersecurity situational awareness taxonomy, 2017 International Conference On Cyber Situational Awareness, pp.1-8, 2017.

,

R. Gutzwiller, Situation awareness in defensive cyberspace operations: An annotated bibliographic assessment through 2015, 2019.

R. Hackathorn and T. Margolis, Immersive analytics: Building virtual data worlds for collaborative decision support, Workshop on Immersive Analytics (IA), pp.44-47, 2016.

B. P. Hámornik and C. Krasznay, Prerequisites of virtual teamwork in security operations centers: Knowledge, skills, abilities and other characteristics. Academic and Applied Research in Military and Public Management Science p, p.73, 2017.

A. Kabil, T. Duval, N. Cuppens, G. Le-comte, Y. Halgand et al., 3D CyberCOP: a Collaborative Platform for Cybersecurity Data Analysis and Training, proceedings of CDVE 2018 (15th International Conference on Cooperative Design, Visualization and Engineering, pp.176-183, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01831965

A. Kabil, T. Duval, N. Cuppens, G. Le-comte, Y. Halgand et al., From Cyber Security Activities to Collaborative Virtual Environments Practices through the 3D CyberCOP Platform, 14th International Conference on Information Systems Security, pp.272-287, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01892161

A. Kabil, T. Duval, N. Cuppens, G. Le-comte, Y. Halgand et al., Why should we use 3D Collaborative Virtual Environments for Cyber Security?, IEEE Fourth VR International Workshop on Collaborative Virtual Environments, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01770064

S. Mckenna, D. Staheli, and M. Meyer, Unlocking user-centered design methods for building cyber security visualizations, Visualization for Cyber Security (VizSec), 2015 IEEE Symposium on, pp.1-8, 2015.

S. Mohurle and M. Patil, A brief study of wannacry threat: Ransomware attack 2017, International Journal of Advanced Research in Computer Science, vol.8, issue.5, 2017.

T. Pahi, M. Leitner, and F. Skopik, Data exploitation at large: your way to adequate cyber common operating pictures, Proceedings of the 16th European Conference on Cyber Warfare and Security, pp.307-315, 2017.

M. C. Salzman, C. Dede, and R. B. Loftin, Vr's frames of reference: A visualization technique for mastering abstract multidimensional information, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. pp. 489-495. CHI '99, 1999.

A. Sebok, E. Nystad, and A. Droivoldsmo, Improving safety and human performance in maintenance and outage planning through virtual reality-based training systems, Proceedings of the IEEE 7th Conference on Human Factors and Power Plants, pp.8-8, 2002.

A. Sethi and G. Wills, Expert-interviews led analysis of eevi -a model for effective visualization in cyber-security, 2017 IEEE Symposium on Visualization for Cyber Security (VizSec), pp.1-8, 2017.

D. Staheli, V. Mancuso, R. Harnasch, C. Fulcher, M. Chmielinski et al., Collaborative data analysis and discovery for cyber security, Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). USENIX Association, Denver, 2016.

S. C. Sundaramurthy, J. Mchugh, X. Ou, M. Wesch, A. G. Bardas et al., Turning contradictions into innovations or: How we learned to stop whining and improve security operations, Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). pp. 237-251. USENIX Association, 2016.

T. Takahashi, Y. Kadobayashi, and K. Nakao, Toward global cybersecurity collaboration: Cybersecurity operation activity model, Proceedings of ITU Kaleidoscope 2011: The Fully Networked Human? -Innovations for Future Networks and Services (K-2011), pp.1-8, 2011.

M. Varga, C. Winkelholz, and S. Träber-burdin, The application of visual analytics to cyber security, 2017.

S. Zhang, R. Shi, and J. Zhao, A visualization system for multiple heterogeneous network security data and fusion analysis, KSII Transactions on Internet & Information Systems, vol.10, issue.6, 2016.

C. Zhong, J. Yen, P. Liu, R. F. Erbacher, C. Garneau et al., Studying Analysts' Data Triage Operations in Cyber Defense Situational Analysis, pp.128-169, 2017.

Z. Zhong, Y. Zhao, R. Shi, Y. Sheng, J. Liu et al., A user-centered multi-space collaborative visual analysis for cyber security, Chinese Journal of Electronics, vol.27, issue.5, pp.910-919, 2018.