Internet traffic classification demystified, Proceedings of the 2008 ACM CoNEXT Conference on, CONEXT '08, 2008. ,
DOI : 10.1145/1544012.1544023
Early Recognition of Encrypted Applications, pp.165-175, 2007. ,
DOI : 10.1007/978-3-540-71617-4_17
URL : https://hal.archives-ouvertes.fr/hal-01097556
Internet Traffic Classification Using Bayesian Analysis Techniques, ACM SIGMETRICS'05, pp.50-60, 2005. ,
A Comparative Study of Unsupervised Machine Learning and Data Mining Techniques for Intrusion Detection, MLDM '07, pp.404-418, 2007. ,
DOI : 10.1007/978-3-540-73499-4_31
A comparative study of anomaly detection schemes in network intrusion detection, p.3, 2003. ,
Traffic classification using clustering algorithms, Proceedings of the 2006 SIGCOMM workshop on Mining network data , MineNet '06, pp.281-286, 2006. ,
DOI : 10.1145/1162678.1162679
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.167.6051
Traffic Data Reposity at the WIDE Project, 2000. ,
Snort -Lightweight Intrusion Detection for Networks, LISA'99: Proceedings of the 13th USENIX conference on System administration, pp.229-238, 1999. ,
BLINC: Multilevel Traffic Classification in the Dark, ACM SIGCOMM'05, pp.229-240, 2005. ,
Accurate Traffic Classification, 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, 2007. ,
DOI : 10.1109/WOWMOM.2007.4351725
Heuristics to Classify Internet Backbone Traffic based on Connection Patterns, 2008 International Conference on Information Networking, 2008. ,
DOI : 10.1109/ICOIN.2008.4472818
Seven Years and One Day: Sketching the Evolution of Internet Traffic, IEEE INFOCOM 2009, The 28th Conference on Computer Communications, pp.711-719, 2009. ,
DOI : 10.1109/INFCOM.2009.5061979
URL : https://hal.archives-ouvertes.fr/ensl-00290756
Passive network forensics, ACM SIGOPS Operating Systems Review, vol.42, issue.3, pp.99-111, 2008. ,
DOI : 10.1145/1368506.1368520
Profiling internet backbone traffic: behavior models and applications, ACM SIGCOMM'05, pp.169-180, 2005. ,
DOI : 10.1145/1080091.1080112
Elements of Information Theory, 1991. ,
Mining Anomalies Using Traffic Feature Distributions, ACM SIGCOMM'05, pp.217-228, 2005. ,
DOI : 10.1145/1080091.1080118
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.116.4156
Analysis of internet backbone traffic and header anomalies observed, Proceedings of the 7th ACM SIGCOMM conference on Internet measurement , IMC '07, 2007. ,
DOI : 10.1145/1298306.1298321
Application classification using packet size distribution and port association, Journal of Network and Computer Applications, vol.32, issue.5, 2009. ,
DOI : 10.1016/j.jnca.2009.03.001
Tracking Cardinality Distributions in Network Traffic, IEEE INFOCOM 2009, The 28th Conference on Computer Communications, pp.819-827, 2009. ,
DOI : 10.1109/INFCOM.2009.5061991
Sketch Guided Sampling - Using On-Line Estimates of Flow Size for Adaptive Data Collection, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, 2006. ,
DOI : 10.1109/INFOCOM.2006.326
Random Graphs for Statistical Pattern Recognition, Wiley Series in Probability and Statistics, 2004. ,
On the History of the Minimum Spanning Tree Problem, IEEE Annals of the History of Computing, vol.7, issue.1, pp.43-57, 1985. ,
DOI : 10.1109/MAHC.1985.10011
Dual Rooted-Diffusions for Clustering and Classification on Manifolds, 2006 IEEE International Conference on Acoustics Speed and Signal Processing Proceedings, 2006. ,
DOI : 10.1109/ICASSP.2006.1661431
Combining multiple partitions created with a graph-based construction for data clustering, 2009 IEEE International Workshop on Machine Learning for Signal Processing, 2009. ,
DOI : 10.1109/MLSP.2009.5306196
URL : https://hal.archives-ouvertes.fr/hal-00399928
Asymptotic theory of greedy approximations to minimal k-point random graphs, IEEE Transactions on Information Theory, vol.45, issue.6, pp.1921-1939, 1999. ,
DOI : 10.1109/18.782114
Entropie conditionnelle de Rényi et segmentation, Proccedings of the Colloque GRETSI, pp.665-668, 2001. ,
Some properties of R??nyi entropy and R??nyi entropy rate, Information Sciences, vol.179, issue.14, pp.2426-2433, 2009. ,
DOI : 10.1016/j.ins.2009.03.002
IDENTIFICATION OF REGULATORY BINDING SITES USING MINIMUM SPANNING TREES, Biocomputing 2003, pp.327-338, 2003. ,
DOI : 10.1142/9789812776303_0031
On spectral clustering: Analysis and an algorithm, Advances on Neural Information Processing Systems, 2001. ,
Diffusion maps and coarse-graining: a unified framework for dimensionality reduction, graph partitioning, and data set parameterization, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.28, issue.9, pp.1393-1403, 2006. ,
DOI : 10.1109/TPAMI.2006.184
Initialization free graph based clustering, 2009. ,
URL : https://hal.archives-ouvertes.fr/hal-00418623
Estimating routing symmetry on single links by passive flow measurements, Proceedings of the 6th International Wireless Communications and Mobile Computing Conference on ZZZ, IWCMC '10, 2010. ,
DOI : 10.1145/1815396.1815506
Extracting hidden anomalies using sketch and non Gaussian multiresolution statistical detection procedures, Proceedings of the 2007 workshop on Large scale attack defense , LSAD '07, pp.145-152, 2007. ,
DOI : 10.1145/1352664.1352675
URL : https://hal.archives-ouvertes.fr/ensl-00177654
Is P2P dying or just hiding?, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04., pp.1532-1538, 2004. ,
DOI : 10.1109/GLOCOM.2004.1378239
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.6280