L. Après, . Le-futur-directeur-de-thèse, and C. Vincent, MAIA), un importantéchangeimportantéchange de documents et un accord de la direction, je suis maintenant assuré de

R. Clarke, Deep Packet Inspection : Its Nature and Implications " , commissioned as a contribution to a 'Collection of Essays from Industry Experts' on Deep Packet Inspection by the Privacy Commissioner of Canada, En, vol.ligne

A. G. Mason, Cisco Secure Virtual Private Network, p.7, 2002.

A. Sperotto, G. Schaffrath, R. Sadre, C. Morariu, A. Pras et al., An Overview of IP Flow-Based Intrusion Detection, IEEE Communications Surveys & Tutorials, vol.12, issue.3, pp.343-356, 2010.
DOI : 10.1109/SURV.2010.032210.00054

G. Vliek, Detecting spam machines, a Netflow-data based approach En ligne, 2009.

H. Weststrate, Botnet detection using netflow information -Finding new botnets based on client connections En ligne, Structure, 2009.

B. Li, J. Springera, G. Bebisb, and M. H. Gunesb, A survey of network flow applications, Journal of Network and Computer Applications, vol.36, issue.2, pp.567-581, 2013.
DOI : 10.1016/j.jnca.2012.12.020

N. Melnikov and J. Shönwälder, Cybermetrics: User Identification through Network Flow Analysis, Mechanisms for Autonomous Management of Networks and Services, pp.167-170, 2010.
DOI : 10.1007/978-3-642-13986-4_24

URL : https://hal.archives-ouvertes.fr/hal-01056631

P. Mina?-rík and J. Vykopal, Improving Host Profiling with Bidirectional Flows En ligne : http://www. researchgate.net/publication/220775805 Improving Host Profiling with Bidirectional Flows, International Conference on Computational Science and Engineering, 2009.

M. Soysal and E. G. Schmidt, Machine learning algorithms for accurate flow-based network traffic classification: Evaluation and comparison, Performance Evaluation, vol.67, issue.6, pp.451-467, 2010.
DOI : 10.1016/j.peva.2010.01.001

O. Festor and A. Lahmadi, Information Elements for device location in IPFIX En ligne, IETF Internet Draft, 2012.

P. Rashidi, N. Krishnan, and D. J. Cook, Discovering and Tracking Patterns of Interest in Security Sensor Streams, Securing Cyber-Physical Critical Infrastructure, pp.481-504, 2012.
DOI : 10.1016/B978-0-12-415815-3.00019-4

V. I. Levenshtein, Binary codes capable of correcting deletions, insertions, and reversals " , Soviet Physics Doklady, En, vol.10, issue.8, pp.707-710, 1966.

J. Rissanen, Modeling by shortest data description, Automatica, vol.14, issue.5, pp.465-471, 1978.
DOI : 10.1016/0005-1098(78)90005-5

J. B. Macqueen, Some Methods for classification and Analysis of Multivariate Observations En ligne : http://projecteuclid.org/DPubS?service= UI&version=1, Proceedings of 5th Berkeley Symposium on Mathematical Statistics and Probability, pp.281-2971200512992, 1967.

D. E. Knuth, The Art of Computer Programming, 1968.