L. Bernaille, R. Teixeira, and K. Salamatian, Early application identification, Proceedings of the 2006 ACM CoNEXT conference on , CoNEXT '06, 2006.
DOI : 10.1145/1368436.1368445

URL : https://hal.archives-ouvertes.fr/hal-01097554

D. Brauckhoff, A. Wagner, and M. May, FLAME: A Flow-Level Anomaly Modeling Engine, proceedings of CSET, 2008.

T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, Introduction to Algorithms, 2001.

N. Duffield, C. Lund, and . Thorup, Optimal combination of sampled network measurements, Proceedings of the 5th ACM SIGCOMM conference on Internet measurement , IMC '05, 2005.
DOI : 10.1145/1330107.1330118

A. Feldmann, A. Gilbert, P. Huang, and W. Willinger, Dynamics of IP traffic: A study of the role of variability and the impact of control, proceedings of ACM SIGCOMM?99SIGCOMM?SIGCOMM?99, 1999.

N. Hohn and D. Veitch, Inverting sampled traffic, IEEE/ACM Transactions on Networking, vol.14, issue.1, pp.68-80, 2006.
DOI : 10.1109/TNET.2005.863456

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.4.1797

A. Lakhina, M. Crovella, and C. Diot, Mining Anomalies Using Traffic Feature Distributions, proceedings of ACM SIGCOMM, 2005.
DOI : 10.1145/1080091.1080118

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.116.4156

L. Rizzo, Dummynet, ACM SIGCOMM Computer Communication Review, vol.27, issue.1, 1997.
DOI : 10.1145/251007.251012

V. Sekar, M. Reiter, W. Willinger, H. Zhang, R. Kompella et al., cSamp: A System for Network-Wide Flow Monitoring, proceedings of the 5th USENIX NSDI13] Softflowd and Flowd, 2008.

K. Suh, Y. Guo, J. Kurose, and D. Towsley, Locating network monitors: Complexity, heuristics, and coverage, proceedings of IEEE INFOCOM, 2005.
DOI : 10.1016/j.comcom.2005.07.009

M. Thottan and C. Ji, Anomaly detection in IP networks, IEEE Transactions on Signal Processing, vol.51, issue.8, pp.2191-2204, 2003.
DOI : 10.1109/TSP.2003.814797