S. Agrawal and J. Agrawal, Survey on Anomaly Detection using Data Mining Techniques, Procedia Computer Science, vol.60, pp.708-713, 2015.
DOI : 10.1016/j.procs.2015.08.220

URL : http://doi.org/10.1016/j.procs.2015.08.220

L. Akoglu, H. Tong, and D. Koutra, Graph based anomaly detection and description: a survey, Data Mining and Knowledge Discovery, vol.15, issue.1, pp.626-688, 2015.
DOI : 10.1007/s10618-014-0365-y

URL : http://arxiv.org/abs/1404.4679

A. Akyol, M. Hacibeyo?lu, and B. Karlik, Design of Multilevel Hybrid Classifier with Variant Feature Sets for Intrusion Detection System, IEICE Transactions on Information and Systems, vol.99, issue.7, pp.1810-1821, 2016.
DOI : 10.1587/transinf.2015EDP7357

M. Amer and M. Goldstein, Nearest-neighbor and clustering based anomaly detection algorithms for rapidminer, Proceedings of the 3rd RapidMiner Community Meeting and Conferernce, pp.1-12, 2012.

S. S. Bama, M. S. Ahmed, and A. Saravanan, Article: Network intrusion detection using clustering: A data mining approach, International Journal of Computer Applications, vol.30, issue.4, pp.14-17, 2011.

K. Bunte, S. Haase, M. Biehl, and T. Villmann, Stochastic neighbor embedding (SNE) for dimension reduction and visualization using arbitrary divergences, Advances in artificial neural networks, machine learning, and computational intelligence, pp.23-45, 2011.
DOI : 10.1016/j.neucom.2012.02.034

Á. Miguel, Carreira-perpiñán. The elastic embedding algorithm for dimensionality reduction, Proceedings of the 27th International Conference on Machine Learning (ICML), pp.167-174, 2010.

V. Chandola, A. Banerjee, and V. Kumar, Anomaly detection, ACM Computing Surveys, vol.41, issue.3, pp.1-1558, 2009.
DOI : 10.1145/1541880.1541882

H. Debar, M. Becker, and D. Siboni, A neural network component for an intrusion detection system, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy, pp.240-250, 1992.
DOI : 10.1109/RISP.1992.213257

C. Désir, S. Bernard, C. Petitjean, and L. Heutte, One class random forests, Pattern Recognition, vol.46, issue.12, pp.3490-3506, 2013.
DOI : 10.1016/j.patcog.2013.05.022

Z. Ding and M. Fei, An Anomaly Detection Approach Based on Isolation Forest Algorithm for Streaming Data using Sliding Window, IFAC Proceedings Volumes, pp.12-17, 2013.
DOI : 10.3182/20130902-3-CN-3020.00044

R. Fujimaki, Anomaly Detection Support Vector Machine and Its Application to Fault Diagnosis, 2008 Eighth IEEE International Conference on Data Mining, pp.797-802, 2008.
DOI : 10.1109/ICDM.2008.69

K. Anup, A. Ghosh, and . Schwartzbard, A study in using neural networks for anomaly and misuse detection, Proceedings of the 8th Conference on USENIX Security Symposium - SSYM'99, pp.12-12, 1999.

M. Goldstein and S. Uchida, A Comparative Evaluation of Unsupervised Anomaly Detection Algorithms for Multivariate Data, PLOS ONE, vol.27, issue.8, pp.1-31
DOI : 10.1371/journal.pone.0152173.t006

G. Gu, P. Fogla, D. Dagon, W. Lee, and B. ?kori?, Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems, 11th European Symposium on Research in Computer Security (ESORICS), pp.527-546, 2006.
DOI : 10.1007/11863908_32

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.124.174

C. C. , J. Zheng, H. Zhang, and W. Wang, Dimensionality reduction by supervised neighbor embedding using laplacian search, Computational and Mathematical Methods in Medicine, 2014.
DOI : 10.1155/2014/594379

URL : http://doi.org/10.1155/2014/594379

C. Jutten and J. Herault, Blind separation of sources, part 1: An adaptive algorithm based on neuromimetic architecture. Signal Process, pp.1-10, 1991.

M. Kemmler, E. Rodner, E. Wacker, and J. Denzler, One-class classification with Gaussian processes, Pattern Recognition, vol.46, issue.12, pp.3507-3518, 2013.
DOI : 10.1016/j.patcog.2013.06.005

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.672.5811

W. Lee and D. Xiang, Information-theoretic measures for anomaly detection, Proceedings of the 2001 IEEE Symposium on Security and Privacy, SP '01, p.130, 2001.

W. Lin, C. Shih-wen-ke, and . Tsai, Cann: An intrusion detection system based on combining cluster centers and nearest neighbors. Knowledge-Based Systems, pp.13-21, 2015.
DOI : 10.1016/j.knosys.2015.01.009

Y. Lin, P. Lin, S. Wang, I. Chen, and Y. Lai, PCAPLib: A System of Extracting, Classifying, and Anonymizing Real Packet Traces, IEEE Systems Journal, vol.10, issue.2, pp.520-531, 2016.
DOI : 10.1109/JSYST.2014.2301464

F. T. Liu, K. M. Ting, and Z. H. Zhou, Isolation Forest, 2008 Eighth IEEE International Conference on Data Mining, pp.413-422, 2008.
DOI : 10.1109/ICDM.2008.17

T. Fei, K. M. Liu, Z. Ting, and . Zhou, Isolation-based anomaly detection, ACM Trans. Knowl. Discov. Data, vol.63, issue.1, pp.1-3

D. Lunga and O. K. Ersoy, Spherical Stochastic Neighbor Embedding of Hyperspectral Data, IEEE Transactions on Geoscience and Remote Sensing, vol.51, issue.2, pp.857-871, 2013.
DOI : 10.1109/TGRS.2012.2205004

R. Bruno and . Preiss, Data Structures and Algorithms with Object-Oriented Design Patterns in, 1999.

J. Ryan, M. Lin, and R. Miikkulainen, Intrusion detection with neural networks, Advances in Neural Information Processing Systems 10, pp.943-949, 1998.

B. Schölkopf, A. Smola, and K. Müller, Nonlinear Component Analysis as a Kernel Eigenvalue Problem, Neural Computation, vol.20, issue.5, pp.1299-1319, 1998.
DOI : 10.1007/BF02281970

Y. Shen, H. Liu, Y. Wang, Z. Chen, and G. Sun, A Novel Isolation-Based Outlier Detection Method, pp.446-456, 2016.
DOI : 10.1007/978-3-319-42911-3_37

A. Shiravi, H. Shiravi, M. Tavallaee, and A. A. Ghorbani, Toward developing a systematic approach to generate benchmark datasets for intrusion detection, Computers & Security, vol.31, issue.3, pp.357-374, 2012.
DOI : 10.1016/j.cose.2011.12.012