Collection and analysis of attack data based on honeypots deployed on the Internet, In: First Workshop on Quality of Protection, 2005. ,
DOI : 10.1007/978-0-387-36584-8_7
URL : https://hal.archives-ouvertes.fr/hal-00140390
Approaching Process Mining with Sequence Clustering: Experiments and Findings, Proceedings of the 5th International Conference on Business Process Management (BPM), pp.360-374, 2007. ,
DOI : 10.1007/978-3-540-75183-0_26
Design and implementation of web service honeypot, 19th International Conference on Software, Telecommunications and Computer Networks, 2011. ,
Principal Component Analysis, 2002. ,
DOI : 10.1007/978-1-4757-1904-8
The Application of Electronic Computers to Factor Analysis, Educational and Psychological Measurement, vol.20, issue.1, pp.141-151, 1960. ,
DOI : 10.1177/001316446002000116
A tutorial on spectral clustering, Statistics and Computing, vol.21, issue.1, pp.395-416, 2007. ,
DOI : 10.1007/s11222-007-9033-z
Machine Learning and Data Mining for Computer Security: Methods and Applications, 2006. ,
DOI : 10.1007/1-84628-253-5
Honeypot-based Forensics, AusCERT Asia Pacific Information Technology Security Conference, 2004. ,
TANAGRA: a free software for research and academic purposes, Proceedings of EGC'2005, RNTI-E-3, pp.697-702, 2005. ,
Data Mining with SQL Server, 2005. ,
A framework for attack patterns' discovery in honeynet data, Digital Investigation, pp.128-139, 2008. ,
DOI : 10.1016/j.diin.2008.05.012
Identifying intrusions in computer networks with principal component analysis, First International Conference on Availability, Reliability and Security (ARES'06), 2006. ,
DOI : 10.1109/ARES.2006.73