V. Paxson, Bro: a system for detecting network intruders in real-time, Computer Networks, vol.31, issue.23-24, pp.31-2435, 1999.
DOI : 10.1016/S1389-1286(99)00112-7

L. Ma, . Kreibich, and . Savage, Voelker: Unexpected means of protocol inference, In: Internet Measurement Confererence, 2006.

D. X. Song, D. Wagner, and X. Tian, Timing analysis of keystrokes and timing attacks on ssh, Proc. 10th USENIX Security Symposium, 2001.

A. Hintz, Fingerprinting Websites Using Traffic Analysis, 2002.
DOI : 10.1007/3-540-36467-6_13

M. Roughan, S. Sen, O. Spatscheck, and N. Duffield, A statistical signature-based approach to ip traffic classification, 2004.

A. Mcgregor, M. Hall, P. Lorier, and J. Brunskill, Flow Clustering Using Machine Learning Techniques, In: Passive and Active Measurement, 2004.
DOI : 10.1007/978-3-540-24668-8_21

D. Zuev and A. Moore, Traffic Classification Using a Statistical Approach, Passive and Active Measurement, 2005.
DOI : 10.1007/978-3-540-31966-5_25

A. Moore and D. Zuev, Internet traffic classification using bayesian analysis, In: Sigmetrics, 2005.
DOI : 10.1145/1071690.1064220

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.2173

J. Erman, M. Arlitt, and A. Mahanti, Traffic classification using clustering algorithms, Proceedings of the 2006 SIGCOMM workshop on Mining network data , MineNet '06, pp.281-286, 2006.
DOI : 10.1145/1162678.1162679

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.167.6051

L. Bernaille, R. Teixeira, and K. Salamatian, Early application identification, Proceedings of the 2006 ACM CoNEXT conference on , CoNEXT '06, 2006.
DOI : 10.1145/1368436.1368445

URL : https://hal.archives-ouvertes.fr/hal-01097554

M. Wright and . Masson, On inferring application protocol behaviors in encrypted network traffic, the Journal of Machine Learning Research Special Topic on Machine Learning for Computer Security, 2006.

T. Karagiannis, D. Papagiannaki, and M. Faloutsos, Blinc: Multilevel traffic classification in the dark, In: SIGCOMM, 2005.

M. Wright and . Masson, Using visual motifs to classify encrypted traffic, Proceedings of the 3rd international workshop on Visualization for computer security , VizSEC '06, 2006.
DOI : 10.1145/1179576.1179584