The Canadian Automated Air Traffic System ,
Radar/ads-b data fusion architecture for experimentation purpose, Information Fusion, 2006 9th International Conference on, pp.1-6, 2006. ,
Internet group management protocol, version 3. Tech. rep, 2002. ,
NFS version 3 protocol specification, 1995. ,
The TXL Source Transformation Language, Science of Computer Programming, vol.61, issue.3, pp.190-210, 2006. ,
Context sensitive and secure parser generation for deep packet inspection of binary protocols, Proc. of the 15th Annual Conference on Privacy, Security and Trust. PST '17, 2017. ,
On the analysis of linear probing hashing, Algorithmica, vol.22, issue.4, pp.490-515, 1998. ,
URL : https://hal.archives-ouvertes.fr/inria-00073424
Anomalybased network intrusion detection: Techniques, systems and challenges, computers & security, vol.28, issue.1-2, pp.18-28, 2009. ,
A Constraint-based Intrusion Detection System, Proc. of the 5th European Conference on the Engineering of Computer-Based Systems, vol.12, pp.1-12, 2017. ,
Improving intrusion detection system based on SNORT rules for network probe attack detection, Information and Communication Technology (ICoICT), pp.69-74, 2014. ,
, Survey on Constrained based Data Stream Mining, vol.107, pp.12-15, 2014.
Intrusion detection system: A comprehensive review, Journal of Network and Computer Applications, vol.36, issue.1, pp.16-24, 2013. ,
Scl: a language for security testing of network applications, Proceedings of the 2005 conference of the Centre for Advanced Studies on Collaborative research, pp.155-164, 2005. ,
Network time protocol version 4: Protocol and algorithms specification, Tech. rep, 2010. ,
OMG data-distribution service: Architectural overview, Proceedings. 23rd International Conference on, pp.200-206, 2003. ,
Real-time publish-subscribe system, vol.882, p.253, 2011. ,
Performance comparison and detection analysis in SNORT and Suricata environment, Wireless Personal Communications, vol.94, issue.2, pp.241-252, 2017. ,
Classification Trees for Problems with Monotonicity Constraints, Special Interest Group (SIG) on Knowledge Discovery and Data Mining Explorations (SIGKDD), vol.4, pp.1-10, 2002. ,
On using constraints for network intrusion detection, INForum, 2010. ,
Pushing constraints into data streams, Proceedings of the 2nd International Workshop on Big Data, Streams and Heterogeneous Source Mining: Algorithms, Systems, Programming Models and Applications, pp.79-86, 2013. ,
, The TFTP protocol, 1992.
Intrusion detection by machine learning: A review, Expert Systems with Applications, vol.36, issue.10, pp.11994-12000, 2009. ,
Reliable hashing without collision detection, International Conference on Computer Aided Verification, pp.59-70, 1993. ,