The base-rate fallacy and the difficulty of intrusion detection, ACM Transactions on Information and System Security (TISSEC), vol.3, issue.3, pp.186-205, 2000. ,
A new approach of network simulation for data generation in evaluating security products, Internet Monitoring and Protection, 2018. ICIMP 2018. Thirteenth International Conference on. IARIA, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01901017
Defcon capture the flag: Defending vulnerable code from intense attack, DARPA Information Survivability Conference and Exposition, vol.1, pp.120-129, 2003. ,
Evaluating intrusion detection systems without attacking your friends: The 1998 darpa intrusion detection evaluation, 1999. ,
Mawilab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking, Proceedings of the 6th International COnference, p.8, 2010. ,
URL : https://hal.archives-ouvertes.fr/ensl-00552071
Mirage: a management tool for the analysis and deployment of network security policies, Data Privacy Management and Autonomous Spontaneous Security, pp.203-215, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00623634
Model validation and verification options in a contemporary uml and ocl analysis tool, 2016. ,
An overview of issues in testing intrusion detection systems, 2003. ,
A performance view on dnssec migration, Network and Service Management (CNSM), 2010 International Conference on, pp.469-474, 2010. ,
URL : https://hal.archives-ouvertes.fr/hal-01308335
Evaluating sip server performance, ACM SIGMETRICS Performance Evaluation Review, vol.35, pp.349-350, 2007. ,
Distributedsom: A novel performance bottleneck handler for large-sized software-defined networks under flooding attacks, Journal of Network and Computer Applications, vol.91, pp.14-25, 2017. ,
The architecture of virtual machines, Computer, vol.38, issue.5, pp.32-38, 2005. ,