Applications of Mind Mapping automation in the analysis of information security log files

I have started developping applications based on Mind Mapping to help professionals in the analysis of security log files.

My first example, to start with something easy, has been creating a program to analyze Endpoint Protector log files.

Here is a presentation about this issue.

I plan to create more complex applications in case they can be useful to the information security community.

I would like to get feedback about the first impressions about the possibilities of Mind Mapping in Security Visualization.