On the analysis of backscatter traffic, 39th Annual IEEE Conference on Local Computer Networks Workshops, pp.671-678, 2014. ,
DOI : 10.1109/LCNW.2014.6927719
Towards effective feature selection in machine learning-based botnet detection approaches, IEEE Conference on Communications and Network Security, pp.247-255, 2014. ,
There be dragons, Proc. UNIX Security Symposium III, pp.1-16, 1992. ,
Fast unfolding of communities in large networks, Journal of Statistical Mechanics: Theory and Experiment, vol.2008, issue.10, 2008. ,
DOI : 10.1088/1742-5468/2008/10/P10008
URL : https://hal.archives-ouvertes.fr/hal-01146070
Advanced persistent threats: minimising the damage, Network Security, vol.2014, issue.4, pp.5-9, 2014. ,
DOI : 10.1016/S1353-4858(14)70040-6
Topological analysis and visualisation of network monitoring data: Darknet case study, 2016 IEEE International Workshop on Information Forensics and Security (WIFS), 2016. ,
DOI : 10.1109/WIFS.2016.7823920
URL : https://hal.archives-ouvertes.fr/hal-01403950
Analysis of a "/0" stealth scan from a botnet, Proceedings of the 2012 ACM conference on Internet measurement conference, IMC '12, pp.1-14, 2012. ,
DOI : 10.1145/2398776.2398778
An internet-wide view of internet-wide scanning, Proceedings of the 23rd USENIX Conference on Security Symposium, SEC'14, pp.65-78, 2014. ,
Darknet as a Source of Cyber Intelligence: Survey, Taxonomy, and Characterization, IEEE Communications Surveys & Tutorials, vol.18, issue.2, pp.1197-1227, 2016. ,
DOI : 10.1109/COMST.2015.2497690
Activity monitoring for large honeynets and network telescopes, The Second International Conference on Internet Monitoring and Protection, 2009. ,
DOI : 10.1109/icimp.2007.24
URL : https://hal.archives-ouvertes.fr/inria-00392566
Centrality in social networks conceptual clarification, Social Networks, vol.1, issue.3, pp.215-239, 1978. ,
DOI : 10.1016/0378-8733(78)90021-7
URL : http://www.cin.ufpe.br/%7Erbcp/taia/Freeman1979-centrality.pdf
Entelecheia: Detecting P2P botnets in their waiting stage, IFIP Networking Conference, pp.22-24, 2013. ,
Inferring internet denial-of-service activity, ACM Trans. Comput. Syst, pp.115-139, 2006. ,
DOI : 10.1145/1132026.1132027
Modularity and community structure in networks, Proceedings of the National Academy of Sciences, vol.68, issue.6804, pp.8577-8582, 2006. ,
DOI : 10.1073/pnas.021544898
URL : http://www.pnas.org/content/103/23/8577.full.pdf
Finding and evaluating community structure in networks, Physical Review E, vol.65, issue.2, p.26113, 2004. ,
DOI : 10.1103/PhysRevE.68.065103
On the accurate identification of network service dependencies in distributed systems, International Conference on Large Installation System Administration: Strategies, Tools, and Techniques (LISA). USENIX, 2012. ,
InetVis, a visual tool for network telescope traffic analysis, Proceedings of the 4th international conference on Computer graphics, virtual reality, visualisation and interaction in Africa , Afrigaph '06, pp.85-89, 2006. ,
DOI : 10.1145/1108590.1108604