C. Nav, The Canadian Automated Air Traffic System

O. Baud, N. Honore, and O. Taupin, Radar/ads-b data fusion architecture for experimentation purpose, Information Fusion, 2006 9th International Conference on, pp.1-6, 2006.

B. Cain, S. Deering, I. Kouvelas, B. Fenner, and A. Thyagarajan, Internet group management protocol, version 3. Tech. rep, 2002.

B. Callaghan, B. Pawlowski, and P. Staubach, NFS version 3 protocol specification, 1995.

J. R. Cordy, The TXL Source Transformation Language, Science of Computer Programming, vol.61, issue.3, pp.190-210, 2006.

A. Elshakankiry and T. Dean, Context sensitive and secure parser generation for deep packet inspection of binary protocols, Proc. of the 15th Annual Conference on Privacy, Security and Trust. PST '17, 2017.

P. Flajolet, P. Poblete, and A. Viola, On the analysis of linear probing hashing, Algorithmica, vol.22, issue.4, pp.490-515, 1998.
URL : https://hal.archives-ouvertes.fr/inria-00073424

P. Garcia-teodoro, J. Diaz-verdejo, G. Maciá-fernández, and E. Vázquez, Anomalybased network intrusion detection: Techniques, systems and challenges, computers & security, vol.28, issue.1-2, pp.18-28, 2009.

M. S. Hasan, T. Dean, F. T. Imam, F. Garcia, S. P. Leblanc et al., A Constraint-based Intrusion Detection System, Proc. of the 5th European Conference on the Engineering of Computer-Based Systems, vol.12, pp.1-12, 2017.

N. Khamphakdee, N. Benjamas, and S. Saiyod, Improving intrusion detection system based on SNORT rules for network probe attack detection, Information and Communication Technology (ICoICT), pp.69-74, 2014.

L. S. Kurien, K. , S. Kk, and M. , Survey on Constrained based Data Stream Mining, vol.107, pp.12-15, 2014.

H. J. Liao, C. H. Lin, Y. C. Lin, and K. Y. Tung, Intrusion detection system: A comprehensive review, Journal of Network and Computer Applications, vol.36, issue.1, pp.16-24, 2013.

S. Marquis, T. R. Dean, and S. Knight, Scl: a language for security testing of network applications, Proceedings of the 2005 conference of the Centre for Advanced Studies on Collaborative research, pp.155-164, 2005.

D. Mills, J. Martin, J. Burbank, and W. Kasch, Network time protocol version 4: Protocol and algorithms specification, Tech. rep, 2010.

G. Pardo-castellote, OMG data-distribution service: Architectural overview, Proceedings. 23rd International Conference on, pp.200-206, 2003.

G. Pardo-castellote, M. Hamilton, and S. S. Thiebaut, Real-time publish-subscribe system, vol.882, p.253, 2011.

W. Park and S. Ahn, Performance comparison and detection analysis in SNORT and Suricata environment, Wireless Personal Communications, vol.94, issue.2, pp.241-252, 2017.

R. Potharst and A. J. Feelders, Classification Trees for Problems with Monotonicity Constraints, Special Interest Group (SIG) on Knowledge Discovery and Data Mining Explorations (SIGKDD), vol.4, pp.1-10, 2002.

P. Salgueiro and S. Abreu, On using constraints for network intrusion detection, INForum, 2010.

A. Silva and C. Antunes, Pushing constraints into data streams, Proceedings of the 2nd International Workshop on Big Data, Streams and Heterogeneous Source Mining: Algorithms, Systems, Programming Models and Applications, pp.79-86, 2013.

K. Sollins, The TFTP protocol, 1992.

C. F. Tsai, Y. F. Hsu, C. Y. Lin, and W. Y. Lin, Intrusion detection by machine learning: A review, Expert Systems with Applications, vol.36, issue.10, pp.11994-12000, 2009.

P. Wolper and D. Leroy, Reliable hashing without collision detection, International Conference on Computer Aided Verification, pp.59-70, 1993.