Early application identification, Proceedings of the 2006 ACM CoNEXT conference on , CoNEXT '06, 2006. ,
DOI : 10.1145/1368436.1368445
URL : https://hal.archives-ouvertes.fr/hal-01097554
FLAME: A Flow-Level Anomaly Modeling Engine, proceedings of CSET, 2008. ,
Introduction to Algorithms, 2001. ,
Optimal combination of sampled network measurements, Proceedings of the 5th ACM SIGCOMM conference on Internet measurement , IMC '05, 2005. ,
DOI : 10.1145/1330107.1330118
Dynamics of IP traffic: A study of the role of variability and the impact of control, proceedings of ACM SIGCOMM?99SIGCOMM?SIGCOMM?99, 1999. ,
Inverting sampled traffic, IEEE/ACM Transactions on Networking, vol.14, issue.1, pp.68-80, 2006. ,
DOI : 10.1109/TNET.2005.863456
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.4.1797
Mining Anomalies Using Traffic Feature Distributions, proceedings of ACM SIGCOMM, 2005. ,
DOI : 10.1145/1080091.1080118
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.116.4156
Dummynet, ACM SIGCOMM Computer Communication Review, vol.27, issue.1, 1997. ,
DOI : 10.1145/251007.251012
cSamp: A System for Network-Wide Flow Monitoring, proceedings of the 5th USENIX NSDI13] Softflowd and Flowd, 2008. ,
Locating network monitors: Complexity, heuristics, and coverage, proceedings of IEEE INFOCOM, 2005. ,
DOI : 10.1016/j.comcom.2005.07.009
Anomaly detection in IP networks, IEEE Transactions on Signal Processing, vol.51, issue.8, pp.2191-2204, 2003. ,
DOI : 10.1109/TSP.2003.814797