E. Alata, M. Dacier, Y. Deswarte, M. Kaniche, K. Kortchinsky et al., Collection and analysis of attack data based on honeypots deployed on the Internet, In: First Workshop on Quality of Protection, 2005.
DOI : 10.1007/978-0-387-36584-8_7

URL : https://hal.archives-ouvertes.fr/hal-00140390

D. Ferreira, M. Zacarias, M. Malheiros, and P. Ferreira, Approaching Process Mining with Sequence Clustering: Experiments and Findings, Proceedings of the 5th International Conference on Business Process Management (BPM), pp.360-374, 2007.
DOI : 10.1007/978-3-540-75183-0_26

A. Ghourabi, T. Abbes, and A. Bouhoula, Design and implementation of web service honeypot, 19th International Conference on Software, Telecommunications and Computer Networks, 2011.

I. T. Jolliffe, Principal Component Analysis, 2002.
DOI : 10.1007/978-1-4757-1904-8

H. F. Kaiser, The Application of Electronic Computers to Factor Analysis, Educational and Psychological Measurement, vol.20, issue.1, pp.141-151, 1960.
DOI : 10.1177/001316446002000116

U. Luxburg, A tutorial on spectral clustering, Statistics and Computing, vol.21, issue.1, pp.395-416, 2007.
DOI : 10.1007/s11222-007-9033-z

M. A. Maloof, Machine Learning and Data Mining for Computer Security: Methods and Applications, 2006.
DOI : 10.1007/1-84628-253-5

F. Pouget and M. Dacier, Honeypot-based Forensics, AusCERT Asia Pacific Information Technology Security Conference, 2004.

R. Rakotomalala, TANAGRA: a free software for research and academic purposes, Proceedings of EGC'2005, RNTI-E-3, pp.697-702, 2005.

Z. Tang and J. Maclennan, Data Mining with SQL Server, 2005.

O. Thonnard and M. Dacier, A framework for attack patterns' discovery in honeynet data, Digital Investigation, pp.128-139, 2008.
DOI : 10.1016/j.diin.2008.05.012

W. Wang and R. Battiti, Identifying intrusions in computer networks with principal component analysis, First International Conference on Availability, Reliability and Security (ARES'06), 2006.
DOI : 10.1109/ARES.2006.73