B. L. Agarwal, Basic statistics. New Age International, 2006.

C. , Outlier Analysis, 2016.

L. Akoglu and C. Faloutsos, Event detection in time series of mobile communication graphs, Army science conference, pp.77-79, 2010.

L. Akoglu, H. Tong, and D. Koutra, Graph based anomaly detection and description: a survey, Data mining and knowledge discovery, vol.29, issue.3, pp.626-688, 2015.

M. Araujo, S. Papadimitriou, S. Günnemann, C. Faloutsos, P. Basu et al., Com2: fast automatic discovery of temporal ('comet') communities, Pacific-Asia Conference on Knowledge Discovery and Data Mining, pp.271-283, 2014.

H. Asai, K. Fukuda, P. Abry, P. Borgnat, and H. Esaki, Network application profiling with traffic causality graphs, International Journal of Network Management, vol.24, issue.4, pp.289-303, 2014.

P. Barford, J. Kline, D. Plonka, and A. Ron, A signal analysis of network traffic anomalies, Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, pp.71-82, 2002.

V. Batagelj and S. Praprotnik, An algebraic approach to temporal network analysis based on temporal quantities, Social Network Analysis and Mining, vol.6, issue.1, p.28, 2016.

M. Berlingerio, D. Koutra, T. Eliassi-rad, and C. Faloutsos, Netsimile: A scalable approach to size-independent network similarity, 2012.

P. Borgnat, G. Dewaele, K. Fukuda, P. Abry, and K. Cho, Seven years and one day: Sketching the evolution of internet traffic, INFOCOM 2009, pp.711-719, 2009.
URL : https://hal.archives-ouvertes.fr/ensl-00290756

A. Casteigts, P. Flocchini, W. Quattrociocchi, and N. Santoro, Timevarying graphs and dynamic networks, International Journal of Parallel, Emergent and Distributed Systems, vol.27, issue.5, pp.387-408, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00847001

D. Chakrabarti, Autopart: Parameter-free graph partitioning and outlier detection, European Conference on Principles of Data Mining and Knowledge Discovery, pp.112-124, 2004.

V. Chandola, A. Banerjee, and V. Kumar, Anomaly detection: A survey, ACM computing surveys (CSUR), vol.41, issue.3, p.15, 2009.

Z. Chen, W. Hendrix, and N. F. Samatova, Community-based anomaly detection in evolutionary networks, Journal of Intelligent Information Systems, vol.39, issue.1, pp.59-85, 2012.

D. Duan, Y. Li, Y. Jin, and Z. Lu, Community mining on dynamic weighted directed graphs, Proceedings of the 1st ACM international workshop on Complex networks meet information & knowledge management, pp.11-18, 2009.

D. Eswaran and C. Faloutsos, Sedanspot: Detecting anomalies in edge streams. ICDM. IEEE, 2018.

R. Fontugne, P. Borgnat, P. Abry, and K. Fukuda, Mawilab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking, Proceedings of the 6th International COnference, 2010.
URL : https://hal.archives-ouvertes.fr/ensl-00552071

F. E. Grubbs, Procedures for detecting outlying observations in samples, Technometrics, vol.11, issue.1, pp.1-21, 1969.

M. Gupta, J. Gao, Y. Sun, and J. Han, Community trend outlier detection using soft temporal pattern mining, Joint European Conference on Machine Learning and Knowledge Discovery in Databases, pp.692-708, 2012.

M. Gupta, J. Gao, Y. Sun, and J. Han, Integrating community matching and outlier detection for mining evolutionary community outliers, Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining, pp.859-867, 2012.

J. Han, J. Pei, and M. Kamber, Data mining: concepts and techniques, 2011.

H. Huang, H. Al-azzawi, and H. Brani, Network traffic anomaly detection, 2014.

T. Idé and H. Kashima, Eigenspace-based anomaly detection in computer systems, Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, pp.440-449, 2004.

K. Ishibashi, T. Kondoh, S. Harada, T. Mori, R. Kawahara et al., Detecting anomalous traffic using communication graphs, Telecommunications: The Infrastructure for the 21st Century (WTC), pp.1-6, 2010.

A. Kato, J. Murai, S. Katsuno, and T. Asami, An internet traffic data repository: The architecture and the design policy, INET'99 Proceedings, 1999.

A. Lakhina, M. Crovella, and C. Diot, Diagnosing network-wide traffic anomalies, ACM SIGCOMM Computer Communication Review, vol.34, pp.219-230, 2004.

M. Latapy, A. Hamzaoui, and C. Magnien, Detecting events in the dynamics of ego-centred measurements of the internet topology, Journal of Complex Networks, vol.2, issue.1, pp.38-59, 2013.

M. Latapy, T. Viard, and C. Magnien, Stream graphs and link streams for the modeling of interactions over time, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01665084

W. Lee and S. J. Stolfo, Data mining approaches for intrusion detection, USENIX Security Symposium, pp.79-93, 1998.

Y. Léo, C. Crespelle, and E. Fleury, Non-altering time scales for aggregation of dynamic networks into series of graphs, Computer Networks, vol.148, pp.108-119, 2019.

E. Manzoor, S. M. Milajerdi, and L. Akoglu, Fast memory-efficient anomaly detection in streaming heterogeneous graphs, Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp.1035-1044, 2016.

J. Mazel, R. Fontugne, and K. Fukuda, A taxonomy of anomalies in backbone network traffic, Wireless Communications and Mobile Computing Conference (IWCMC), pp.30-36, 2014.

M. Mongiovi, P. Bogdanov, R. Ranca, E. E. Papalexakis, C. Faloutsos et al., Netspot: Spotting significant anomalous regions on dynamic networks, Proceedings of the 2013 SIAM International Conference on Data Mining, pp.28-36, 2013.

H. J. Motulsky and R. E. Brown, Detecting outliers when fitting data with nonlinear regression-a new method based on robust nonlinear regression and the false discovery rate, BMC bioinformatics, vol.7, issue.1, 2006.

P. Papadimitriou, A. Dasdan, and H. Garcia-molina, Web graph similarity for anomaly detection, Journal of Internet Services and Applications, vol.1, issue.1, pp.19-30, 2010.

B. Pincombe, Anomaly detection in time series of graphs using arma processes, Asor Bulletin, vol.24, issue.4, 2005.

W. H. Press, S. A. Teukolsky, W. T. Vetterling, and B. P. Flannery, Numerical recipes in c: The art of scientific computing, 1992.

S. Ranshous, S. Harenberg, K. Sharma, and N. F. Samatova, A scalable approach for outlier detection in edge streams using sketchbased approximations, Proceedings of the 2016 SIAM International Conference on Data Mining, pp.189-197, 2016.

S. Ranshous, S. Shen, D. Koutra, S. Harenberg, C. Faloutsos et al., Anomaly detection in dynamic networks: a survey

, Wiley Interdisciplinary Reviews: Computational Statistics, vol.7, issue.3, pp.223-247, 2015.

H. Ringberg, A. Soule, J. Rexford, and C. Diot, Sensitivity of pca for traffic anomaly detection, ACM SIGMETRICS Performance Evaluation Review, vol.35, issue.1, pp.109-120, 2007.

R. Saxena, S. Kaur, D. Dash, and V. Bhatnagar, Leveraging structural hierarchy for scalable network comparison, International Conference on Database and Expert Systems Applications, pp.287-302, 2016.

T. A. Schieber, L. Carpi, A. Díaz-guilera, P. M. Pardalos, C. Masoller et al., Quantification of network structural dissimilarities, Nature communications, vol.8, p.13928, 2017.

J. Sun, C. Faloutsos, S. Papadimitriou, and P. S. Yu, Graphscope: parameter-free mining of large time-evolving graphs, Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, pp.687-696, 2007.

T. Viard, R. Fournier-s'niehotta, C. Magnien, and M. Latapy, Discovering patterns of interest in ip traffic using cliques in bipartite link streams, Proceedings of the International Conference on Complex Networks (CompleNet), 2018.
URL : https://hal.archives-ouvertes.fr/hal-01665089

Y. Virkar and A. Clauset, Power-law distributions in binned empirical data, The Annals of Applied Statistics, pp.89-119, 2014.

K. Wehmuth, A. Ziviani, and E. Fleury, A unifying model for representing time-varying graphs, Data Science and Advanced Analytics (DSAA), 2015. 36678 2015. IEEE International Conference on, pp.1-10, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01270367

J. Whitbeck, M. Dias-de-amorim, V. Conan, and J. Guillaume, Temporal reachability graphs, Proceedings of the 18th annual international conference on Mobile computing and networking, pp.377-388, 2012.
URL : https://hal.archives-ouvertes.fr/hal-01273067

N. Williams, S. Zander, and G. Armitage, A preliminary performance comparison of five machine learning algorithms for practical ip traffic flow classification, ACM SIGCOMM Computer Communication Review, vol.36, issue.5, pp.5-16, 2006.

A. Wilmet, T. Viard, M. Latapy, and R. Lamarche-perrin, Degree-based outliers detection within ip traffic modelled as a link stream, Network Traffic Measurement and Analysis Conference (TMA), pp.1-8, 2018.
URL : https://hal.archives-ouvertes.fr/hal-02085261

K. Xu, F. Wang, and L. Gu, Behavior analysis of internet traffic via bipartite graphs and one-mode projections, IEEE/ACM Transactions on Networking, vol.22, pp.931-942, 2014.

W. Yu, C. C. Aggarwal, S. Ma, and H. Wang, On anomalous hotspot discovery in graph streams, IEEE 13th International Conference on, pp.1271-1276, 2013.