E. Balkanli and A. N. Zincir-heywood, On the analysis of backscatter traffic, 39th Annual IEEE Conference on Local Computer Networks Workshops, pp.671-678, 2014.
DOI : 10.1109/LCNW.2014.6927719

E. B. Beigi, H. H. Jazi, N. Stakhanova, and A. A. Ghorbani, Towards effective feature selection in machine learning-based botnet detection approaches, IEEE Conference on Communications and Network Security, pp.247-255, 2014.

S. M. Bellovin, There be dragons, Proc. UNIX Security Symposium III, pp.1-16, 1992.

V. D. Blondel, J. Loup-guillaume, R. Lambiotte, and E. Lefebvre, Fast unfolding of communities in large networks, Journal of Statistical Mechanics: Theory and Experiment, vol.2008, issue.10, 2008.
DOI : 10.1088/1742-5468/2008/10/P10008

URL : https://hal.archives-ouvertes.fr/hal-01146070

R. Brewer, Advanced persistent threats: minimising the damage, Network Security, vol.2014, issue.4, pp.5-9, 2014.
DOI : 10.1016/S1353-4858(14)70040-6

M. Coudriau, A. Lahmadi, and J. Francois, Topological analysis and visualisation of network monitoring data: Darknet case study, 2016 IEEE International Workshop on Information Forensics and Security (WIFS), 2016.
DOI : 10.1109/WIFS.2016.7823920

URL : https://hal.archives-ouvertes.fr/hal-01403950

A. Dainotti, A. King, F. Claffy, A. Papale, and . Pescapè, Analysis of a "/0" stealth scan from a botnet, Proceedings of the 2012 ACM conference on Internet measurement conference, IMC '12, pp.1-14, 2012.
DOI : 10.1145/2398776.2398778

Z. Durumeric, M. Bailey, and J. A. Halderman, An internet-wide view of internet-wide scanning, Proceedings of the 23rd USENIX Conference on Security Symposium, SEC'14, pp.65-78, 2014.

C. Fachkha and M. Debbabi, Darknet as a Source of Cyber Intelligence: Survey, Taxonomy, and Characterization, IEEE Communications Surveys & Tutorials, vol.18, issue.2, pp.1197-1227, 2016.
DOI : 10.1109/COMST.2015.2497690

J. Francois, R. State, and O. Festor, Activity monitoring for large honeynets and network telescopes, The Second International Conference on Internet Monitoring and Protection, 2009.
DOI : 10.1109/icimp.2007.24

URL : https://hal.archives-ouvertes.fr/inria-00392566

L. C. Freeman, Centrality in social networks conceptual clarification, Social Networks, vol.1, issue.3, pp.215-239, 1978.
DOI : 10.1016/0378-8733(78)90021-7

URL : http://www.cin.ufpe.br/%7Erbcp/taia/Freeman1979-centrality.pdf

H. Hang, X. Wei, M. Faloutsos, and T. Eliassi-rad, Entelecheia: Detecting P2P botnets in their waiting stage, IFIP Networking Conference, pp.22-24, 2013.

D. Moore, C. Shannon, D. J. Brown, G. M. Voelker, and S. Savage, Inferring internet denial-of-service activity, ACM Trans. Comput. Syst, pp.115-139, 2006.
DOI : 10.1145/1132026.1132027

M. E. Newman, Modularity and community structure in networks, Proceedings of the National Academy of Sciences, vol.68, issue.6804, pp.8577-8582, 2006.
DOI : 10.1073/pnas.021544898

URL : http://www.pnas.org/content/103/23/8577.full.pdf

M. E. Newman and M. Girvan, Finding and evaluating community structure in networks, Physical Review E, vol.65, issue.2, p.26113, 2004.
DOI : 10.1103/PhysRevE.68.065103

B. Peddycord, I. , P. Ning, and S. Jajodia, On the accurate identification of network service dependencies in distributed systems, International Conference on Large Installation System Administration: Strategies, Tools, and Techniques (LISA). USENIX, 2012.

J. Van-riel and B. Irwin, InetVis, a visual tool for network telescope traffic analysis, Proceedings of the 4th international conference on Computer graphics, virtual reality, visualisation and interaction in Africa , Afrigaph '06, pp.85-89, 2006.
DOI : 10.1145/1108590.1108604