Etude d'un système de détection d'intrusion comportemental pour l'analyse du trafic aéroportuaire, 2011. ,
Anomaly detection, ACM Computing Surveys, vol.41, issue.3, p.15, 2009. ,
DOI : 10.1145/1541880.1541882
A signal analysis of network traffic anomalies, Proceedings of the second ACM SIGCOMM Workshop on Internet measurment , IMW '02, pp.71-82, 2002. ,
DOI : 10.1145/637201.637210
Combining filtering and statistical methods for anomaly detection, Proceedings of the 5th ACM SIGCOMM conference on Internet measurement , IMC '05, pp.31-31, 2005. ,
DOI : 10.1145/1330107.1330147
URL : https://hal.archives-ouvertes.fr/hal-01489028
Sketch-based change detection, Proceedings of the 2003 ACM SIGCOMM conference on Internet measurement , IMC '03, pp.234-247, 2003. ,
DOI : 10.1145/948205.948236
Anomaly Extraction in Backbone Networks Using Association Rules, IEEE/ACM Transactions on Networking, vol.20, issue.6, pp.1788-1799, 2012. ,
DOI : 10.1109/TNET.2012.2187306
URL : https://hal.archives-ouvertes.fr/hal-00527139
Diagnosing network-wide traffic anomalies, ACM SIGCOMM Computer Communication Review, pp.219-230, 2004. ,
ADMIRE: Anomaly detection method using entropy-based PCA with three-step sketches, Computer Communications, vol.36, issue.5, pp.575-588, 2013. ,
DOI : 10.1016/j.comcom.2012.12.002
A Hough-transform-based anomaly detector with an adaptive time interval, ACM SIGAPP Applied Computing Review, vol.11, issue.3, pp.41-51, 2011. ,
DOI : 10.1145/2034594.2034598
Mining anomalies using traffic feature distributions, ACM SIGCOMM Computer Communication Review, pp.217-228, 2005. ,
DOI : 10.1145/1080091.1080118
URL : https://open.bu.edu/bitstream/2144/1823/1/2005-002-anomaly-mining.pdf
Accurate network anomaly classification with generalized entropy metrics, Computer Networks, vol.55, issue.15, pp.3485-3502, 2011. ,
DOI : 10.1016/j.comnet.2011.07.008
Seven Years and One Day: Sketching the Evolution of Internet Traffic, IEEE INFOCOM 2009, The 28th Conference on Computer Communications, pp.711-719, 2009. ,
DOI : 10.1109/INFCOM.2009.5061979
URL : https://hal.archives-ouvertes.fr/ensl-00290756
Long-range Dependence: Revisiting Aggregation with Wavelets, Journal of Time Series Analysis, vol.19, issue.3, pp.253-266, 1998. ,
DOI : 10.1111/1467-9892.00090
URL : http://www.emulab.ee.mu.oz.au/~darryl/A2.ps.gz
Network intrusion detection system for drone fleet using both spectral analysis and robust controller/observer, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01652296
Outlier Detection for Temporal Data: A Survey, IEEE Transactions on Knowledge and Data Engineering, vol.26, issue.9, pp.2250-2267, 2014. ,
DOI : 10.1109/TKDE.2013.184
URL : http://dais.cs.uiuc.edu/manish/pub/gupta12_temporalOutlierDetectionSurvey.pdf
Twitter Engineering: Introducing practical and robust anomaly detection in a time series, pp.1-1, 2015. ,
Generic and Scalable Framework for Automated Time-series Anomaly Detection, Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '15, pp.1939-1947, 2015. ,
DOI : 10.1080/00401706.1983.10487848
Real-Time Anomaly Detection for Streaming Analytics, 2016. ,
Anomaly detection in bitcoin network using unsupervised learning methods, 2016. ,