H. Kim, M. Kc-claffy, D. Fomenkov, M. Barman, K. Y. Faloutsos et al., Internet traffic classification demystified, Proceedings of the 2008 ACM CoNEXT Conference on, CONEXT '08, 2008.
DOI : 10.1145/1544012.1544023

L. Bernaille and R. Teixeira, Early Recognition of Encrypted Applications, pp.165-175, 2007.
DOI : 10.1007/978-3-540-71617-4_17

URL : https://hal.archives-ouvertes.fr/hal-01097556

A. W. Moore and D. Zuev, Internet Traffic Classification Using Bayesian Analysis Techniques, ACM SIGMETRICS'05, pp.50-60, 2005.

R. Sadoddin and A. A. Ghorbani, A Comparative Study of Unsupervised Machine Learning and Data Mining Techniques for Intrusion Detection, MLDM '07, pp.404-418, 2007.
DOI : 10.1007/978-3-540-73499-4_31

L. A. Prepared, A. Lazarevic, L. Ozgur, J. Ertoz, V. Srivastava et al., A comparative study of anomaly detection schemes in network intrusion detection, p.3, 2003.

J. Erman, M. Arlitt, and A. Mahanti, Traffic classification using clustering algorithms, Proceedings of the 2006 SIGCOMM workshop on Mining network data , MineNet '06, pp.281-286, 2006.
DOI : 10.1145/1162678.1162679

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.167.6051

K. Cho, K. Mitsuya, and A. Kato, Traffic Data Reposity at the WIDE Project, 2000.

M. Roesch, Snort -Lightweight Intrusion Detection for Networks, LISA'99: Proceedings of the 13th USENIX conference on System administration, pp.229-238, 1999.

T. Karagiannis, K. Papagiannaki, and M. Faloutsos, BLINC: Multilevel Traffic Classification in the Dark, ACM SIGCOMM'05, pp.229-240, 2005.

G. Szabo, I. Szabo, and D. Orincasy, Accurate Traffic Classification, 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, 2007.
DOI : 10.1109/WOWMOM.2007.4351725

W. John and S. Tafvelin, Heuristics to Classify Internet Backbone Traffic based on Connection Patterns, 2008 International Conference on Information Networking, 2008.
DOI : 10.1109/ICOIN.2008.4472818

P. Borgnat, G. Dewaele, K. Fukuda, P. Abry, and K. Cho, Seven Years and One Day: Sketching the Evolution of Internet Traffic, IEEE INFOCOM 2009, The 28th Conference on Computer Communications, pp.711-719, 2009.
DOI : 10.1109/INFCOM.2009.5061979

URL : https://hal.archives-ouvertes.fr/ensl-00290756

J. Mchugh, R. Mcleod, and V. Nagaonkar, Passive network forensics, ACM SIGOPS Operating Systems Review, vol.42, issue.3, pp.99-111, 2008.
DOI : 10.1145/1368506.1368520

K. Xu, Z. Zhang, and S. Bhattacharyya, Profiling internet backbone traffic: behavior models and applications, ACM SIGCOMM'05, pp.169-180, 2005.
DOI : 10.1145/1080091.1080112

T. Cover and J. Thomas, Elements of Information Theory, 1991.

A. Lakhina, M. Crovella, and C. Diot, Mining Anomalies Using Traffic Feature Distributions, ACM SIGCOMM'05, pp.217-228, 2005.
DOI : 10.1145/1080091.1080118

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.116.4156

W. John and S. Tafvelin, Analysis of internet backbone traffic and header anomalies observed, Proceedings of the 7th ACM SIGCOMM conference on Internet measurement , IMC '07, 2007.
DOI : 10.1145/1298306.1298321

Y. Lin, C. Lu, Y. Lai, W. Peng, and P. Lin, Application classification using packet size distribution and port association, Journal of Network and Computer Applications, vol.32, issue.5, 2009.
DOI : 10.1016/j.jnca.2009.03.001

A. Chen, L. E. Li, and J. Cao, Tracking Cardinality Distributions in Network Traffic, IEEE INFOCOM 2009, The 28th Conference on Computer Communications, pp.819-827, 2009.
DOI : 10.1109/INFCOM.2009.5061991

A. Kumar and J. Xu, Sketch Guided Sampling - Using On-Line Estimates of Flow Size for Adaptive Data Collection, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, 2006.
DOI : 10.1109/INFOCOM.2006.326

J. David and . Marchette, Random Graphs for Statistical Pattern Recognition, Wiley Series in Probability and Statistics, 2004.

R. L. Graham and P. Hell, On the History of the Minimum Spanning Tree Problem, IEEE Annals of the History of Computing, vol.7, issue.1, pp.43-57, 1985.
DOI : 10.1109/MAHC.1985.10011

S. Grikschat, J. A. Costa, A. O. Hero, and O. Michel, Dual Rooted-Diffusions for Clustering and Classification on Manifolds, 2006 IEEE International Conference on Acoustics Speed and Signal Processing Proceedings, 2006.
DOI : 10.1109/ICASSP.2006.1661431

L. Galluccio, O. Michel, P. Comon, A. O. Hero, and M. Kliger, Combining multiple partitions created with a graph-based construction for data clustering, 2009 IEEE International Workshop on Machine Learning for Signal Processing, 2009.
DOI : 10.1109/MLSP.2009.5306196

URL : https://hal.archives-ouvertes.fr/hal-00399928

A. O. Hero and O. Michel, Asymptotic theory of greedy approximations to minimal k-point random graphs, IEEE Transactions on Information Theory, vol.45, issue.6, pp.1921-1939, 1999.
DOI : 10.1109/18.782114

O. Michel, P. Flandrin, and A. O. Hero, Entropie conditionnelle de Rényi et segmentation, Proccedings of the Colloque GRETSI, pp.665-668, 2001.

L. Golshani, E. Pasha, and G. Yari, Some properties of R??nyi entropy and R??nyi entropy rate, Information Sciences, vol.179, issue.14, pp.2426-2433, 2009.
DOI : 10.1016/j.ins.2009.03.002

V. Olman, D. Xu, and Y. Xu, IDENTIFICATION OF REGULATORY BINDING SITES USING MINIMUM SPANNING TREES, Biocomputing 2003, pp.327-338, 2003.
DOI : 10.1142/9789812776303_0031

A. Y. Ng, M. I. Jordan, and Y. Weiss, On spectral clustering: Analysis and an algorithm, Advances on Neural Information Processing Systems, 2001.

S. Lafon and A. B. Lee, Diffusion maps and coarse-graining: a unified framework for dimensionality reduction, graph partitioning, and data set parameterization, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.28, issue.9, pp.1393-1403, 2006.
DOI : 10.1109/TPAMI.2006.184

L. Galluccio, O. Michel, P. Comon, E. Slezak, and A. O. Hero, Initialization free graph based clustering, 2009.
URL : https://hal.archives-ouvertes.fr/hal-00418623

W. John and M. Dusi, Estimating routing symmetry on single links by passive flow measurements, Proceedings of the 6th International Wireless Communications and Mobile Computing Conference on ZZZ, IWCMC '10, 2010.
DOI : 10.1145/1815396.1815506

G. Dewaele, K. Fukuda, P. Borgnat, P. Abry, and K. Cho, Extracting hidden anomalies using sketch and non Gaussian multiresolution statistical detection procedures, Proceedings of the 2007 workshop on Large scale attack defense , LSAD '07, pp.145-152, 2007.
DOI : 10.1145/1352664.1352675

URL : https://hal.archives-ouvertes.fr/ensl-00177654

T. Karagiannis, A. Broido, N. Brownlee, and M. Faloutsos, Is P2P dying or just hiding?, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04., pp.1532-1538, 2004.
DOI : 10.1109/GLOCOM.2004.1378239

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.6280