M. Agarwal, D. Pasumarthi, S. Biswas, and S. Nandi, Machine learning approach for detection of flooding dos attacks in 802.11 networks and attacker localization, Int. J. Machine Learning & Cybernetics, vol.7, issue.6, pp.1035-1051, 2016.

W. An and M. Liang, Fuzzy support vector machine based on within-class scatter for classification problems with outliers or noises, Neurocomput, vol.110, pp.101-110, 2013.

M. Anbar, R. Abdullah, B. N. Al-tamimi, and A. Hussain, A machine learning approach to detect router advertisement flooding attacks in nextgeneration ipv6 networks, Cognitive Computation, vol.10, issue.2, pp.201-214, 2018.

S. Banescu, C. S. Collberg, and A. Pretschner, Predicting the resilience of obfuscated code against symbolic execution attacks via machine learning, 26th USENIX Security Symposium, pp.661-678, 2017.

B. Biggio, B. Nelson, and P. Laskov, Support vector machines under adversarial label noise, Asian Conference on Machine Learning, pp.97-112, 2011.

J. R. Campos, M. Vieira, and E. Costa, Exploratory study of machine learning techniques for supporting failure prediction, 14th European Dependable Computing Conference, pp.9-16, 2018.

Y. Fan, J. Li, and D. Zhang, A method for identifying critical elements of a cyber-physical system under data attack, IEEE Access, vol.6, pp.16972-16984, 2018.

Z. Fang, J. Tzeng, C. C. Chen, and T. Chou, A study of machine learning models in epidemic surveillance: Using the query logs of search engines, Pacific Asia Conference on Information Systems, PACIS 2010, p.137, 2010.

B. Frénay and M. Verleysen, Classification in the presence of label noise: A survey, IEEE Trans. Neural Netw. Learning Syst, vol.25, issue.5, pp.845-869, 2014.

G. Giantamidis and S. Tripakis, Learning moore machines from inputoutput traces, FM 2016: Formal Methods -21st International Symposium, vol.9995, pp.291-309, 2016.

Y. He, G. J. Mendis, and J. Wei, Real-time detection of false data injection attacks in smart grid: A deep learning-based intelligent mechanism, IEEE Trans. Smart Grid, vol.8, issue.5, pp.2505-2516, 2017.

D. Hendrycks, M. Mazeika, D. Wilson, and K. Gimpel, Using trusted data to train deep networks on labels corrupted by severe noise, 32nd Conference on Neural Information Processing Systems (NIPS 2018)

J. Kang, I. Joo, and D. Choi, False data injection attacks on contingency analysis: Attack strategies and impact assessment, IEEE Access, vol.6, pp.8841-8851, 2018.

D. Karagiannis and A. Argyriou, Jamming attack detection in a pair of RF communicating vehicles using unsupervised machine learning, Vehicular Communications, vol.13, pp.56-63, 2018.

R. Kozik, M. Choras, M. Ficco, and F. Palmieri, A scalable distributed machine learning approach for attack detection in edge computing environments, J. Parallel Distrib. Comput, vol.119, pp.18-26, 2018.

J. Larsen, L. Nonboe, M. Hintz-madsen, and L. K. Hansen, Design of robust neural network classifiers, Proceedings of the 1998 IEEE International Conference on, vol.2, pp.1205-1208, 1998.

Y. Li, J. Yang, Y. Song, L. Cao, J. Luo et al., Learning from noisy labels with distillation, ICCV, pp.1928-1936, 2017.

Y. Meidan, M. Bohadana, Y. Mathov, Y. Mirsky, A. Shabtai et al., N-baiotnetwork-based detection of iot botnet attacks using deep autoencoders, IEEE Pervasive Computing, vol.17, issue.3, pp.12-22, 2018.

N. Natarajan, I. S. Dhillon, P. K. Ravikumar, and A. Tewari, Learning with noisy labels, Advances in neural information processing systems, pp.1196-1204, 2013.

G. Patrini, A. Rozza, A. K. Menon, R. Nock, and L. Qu, Making deep neural networks robust to label noise: A loss correction approach, Proc. IEEE Conf. Comput. Vis. Pattern Recognit.(CVPR), pp.2233-2241, 2017.

F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion et al., Scikit-learn: Machine learning in Python, Journal of Machine Learning Research, vol.12, pp.2825-2830, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00650905

A. Pellegrini, P. Di-sanzo, and D. R. Avresky, A machine learning-based framework for building application failure prediction models, 2015 IEEE International Parallel and Distributed Processing Symposium Workshop, pp.1072-1081, 2015.

T. Pitakrat, A. Van-hoorn, and L. Grunske, A comparison of machine learning algorithms for proactive hard disk drive failure detection, Proceedings of the 4th international ACM Sigsoft symposium on Architecting critical systems, ISARCS 2013, pp.1-10, 2013.

C. Reiss, J. Wilkes, and J. L. Hellerstein, Google cluster-usage traces: format+ schema, pp.1-14, 2011.

U. Reuter, A. Sultan, and D. S. , A comparative study of machine learning approaches for modeling concrete failure surfaces, Advances in Engineering Software, vol.116, pp.67-79, 2018.

A. Rosà, L. Y. Chen, and W. Binder, Failure analysis and prediction for big-data systems, IEEE Trans. Services Computing, vol.10, issue.6, pp.984-998, 2017.

S. Sukhbaatar, J. Bruna, M. Paluri, L. Bourdev, and R. Fergus, Training convolutional networks with noisy labels, 2014.

K. K. Thekumparampil, A. Khetan, Z. Lin, and S. Oh, Robustness of conditional gans to noisy labels, Advances in Neural Information Processing Systems, pp.10291-10302, 2018.

V. N. Vagin and M. V. Fomina, Problem of knowledge discovery in noisy databases, Int. J. Machine Learning & Cybernetics, vol.2, issue.3, pp.135-145, 2011.

A. Vahdat, Toward robustness against label noise in training deep discriminative neural networks, NIPS, pp.5601-5610, 2017.

A. Veit, N. Alldrin, G. Chechik, I. Krasin, A. Gupta et al., Learning from noisy large-scale datasets with minimal supervision, CVPR, pp.6575-6583, 2017.

D. R. Wilson and T. R. Martinez, Reduction techniques for instancebasedlearning algorithms, Mach. Learn, vol.38, issue.3, pp.257-286, 2000.

B. Zhou, J. Li, J. Wu, S. Guo, Y. Gu et al., Machine-learningbased online distributed denial-of-service attack detection using spark streaming, 2018 IEEE International Conference on Communications, pp.1-6, 2018.