M. Amand and M. Nsiri, Etude d'un système de détection d'intrusion comportemental pour l'analyse du trafic aéroportuaire, 2011.

V. Chandola, A. Banerjee, and V. Kumar, Anomaly detection, ACM Computing Surveys, vol.41, issue.3, p.15, 2009.
DOI : 10.1145/1541880.1541882

P. Barford, J. Kline, D. Plonka, and A. Ron, A signal analysis of network traffic anomalies, Proceedings of the second ACM SIGCOMM Workshop on Internet measurment , IMW '02, pp.71-82, 2002.
DOI : 10.1145/637201.637210

A. Soule, K. Salamatian, and N. Taft, Combining filtering and statistical methods for anomaly detection, Proceedings of the 5th ACM SIGCOMM conference on Internet measurement , IMC '05, pp.31-31, 2005.
DOI : 10.1145/1330107.1330147

URL : https://hal.archives-ouvertes.fr/hal-01489028

B. Krishnamurthy, S. Sen, Y. Zhang, and Y. Chen, Sketch-based change detection, Proceedings of the 2003 ACM SIGCOMM conference on Internet measurement , IMC '03, pp.234-247, 2003.
DOI : 10.1145/948205.948236

D. Brauckhoff, X. Dimitropoulos, A. Wagner, and K. Salamatian, Anomaly Extraction in Backbone Networks Using Association Rules, IEEE/ACM Transactions on Networking, vol.20, issue.6, pp.1788-1799, 2012.
DOI : 10.1109/TNET.2012.2187306

URL : https://hal.archives-ouvertes.fr/hal-00527139

A. Lakhina, M. Crovella, and C. Diot, Diagnosing network-wide traffic anomalies, ACM SIGCOMM Computer Communication Review, pp.219-230, 2004.

Y. Kanda, R. Fontugne, K. Fukuda, and T. Sugawara, ADMIRE: Anomaly detection method using entropy-based PCA with three-step sketches, Computer Communications, vol.36, issue.5, pp.575-588, 2013.
DOI : 10.1016/j.comcom.2012.12.002

R. Fontugne and K. Fukuda, A Hough-transform-based anomaly detector with an adaptive time interval, ACM SIGAPP Applied Computing Review, vol.11, issue.3, pp.41-51, 2011.
DOI : 10.1145/2034594.2034598

A. Lakhina, M. Crovella, and C. Diot, Mining anomalies using traffic feature distributions, ACM SIGCOMM Computer Communication Review, pp.217-228, 2005.
DOI : 10.1145/1080091.1080118

URL : https://open.bu.edu/bitstream/2144/1823/1/2005-002-anomaly-mining.pdf

B. Tellenbach, M. Burkhart, D. Schatzmann, D. Gugelmann, and D. Sornette, Accurate network anomaly classification with generalized entropy metrics, Computer Networks, vol.55, issue.15, pp.3485-3502, 2011.
DOI : 10.1016/j.comnet.2011.07.008

P. Borgnat, G. Dewaele, K. Fukuda, P. Abry, and K. Cho, Seven Years and One Day: Sketching the Evolution of Internet Traffic, IEEE INFOCOM 2009, The 28th Conference on Computer Communications, pp.711-719, 2009.
DOI : 10.1109/INFCOM.2009.5061979

URL : https://hal.archives-ouvertes.fr/ensl-00290756

P. Abry, D. Veitch, and P. Flandrin, Long-range Dependence: Revisiting Aggregation with Wavelets, Journal of Time Series Analysis, vol.19, issue.3, pp.253-266, 1998.
DOI : 10.1111/1467-9892.00090

URL : http://www.emulab.ee.mu.oz.au/~darryl/A2.ps.gz

J. Condomines, R. Chemali, and N. Larrieu, Network intrusion detection system for drone fleet using both spectral analysis and robust controller/observer, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01652296

M. Gupta, J. Gao, C. C. Aggarwal, and J. Han, Outlier Detection for Temporal Data: A Survey, IEEE Transactions on Knowledge and Data Engineering, vol.26, issue.9, pp.2250-2267, 2014.
DOI : 10.1109/TKDE.2013.184

URL : http://dais.cs.uiuc.edu/manish/pub/gupta12_temporalOutlierDetectionSurvey.pdf

A. , Twitter Engineering: Introducing practical and robust anomaly detection in a time series, pp.1-1, 2015.

N. Laptev, S. Amizadeh, and I. Flint, Generic and Scalable Framework for Automated Time-series Anomaly Detection, Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '15, pp.1939-1947, 2015.
DOI : 10.1080/00401706.1983.10487848

S. Ahmad and S. Purdy, Real-Time Anomaly Detection for Streaming Analytics, 2016.

T. Pham and S. Lee, Anomaly detection in bitcoin network using unsupervised learning methods, 2016.