S. Abt, C. Dietz, H. Baier, and S. Petrovi´cpetrovi´c, Passive Remote Source NAT Detection Using Behavior Statistics Derived from NetFlow, Lecture Notes in Computer Science, vol.7943, p.148
DOI : 10.1007/978-3-642-38998-6_18

URL : https://hal.archives-ouvertes.fr/hal-01489964

M. Bhuyan, D. Bhattacharyya, and J. Kalita, Network Anomaly Detection: Methods, Systems and Tools, IEEE Communications Surveys & Tutorials, vol.16, issue.1, pp.1-34, 2013.
DOI : 10.1109/SURV.2013.052213.00046

A. C. Callado, C. A. Kamienski, G. Szabo, B. P. Gero, J. Kelner et al., A Survey on Internet Traffic Identification, IEEE Communications Surveys & Tutorials, vol.11, issue.3, pp.37-52, 2009.
DOI : 10.1109/SURV.2009.090304

A. Caracas, A. Kind, D. Gantenbein, S. Fussenegger, and D. Dechouniotis, Mining semantic relations using NetFlow, 2008 3rd IEEE/IFIP International Workshop on Business-driven IT Management, pp.110-111, 2008.
DOI : 10.1109/BDIM.2008.4540082

G. Dewaele, Y. Himura, P. Borgnat, K. Fukuda, P. Abry et al., Unsupervised host behavior classification from connection patterns, International Journal of Network Management, vol.28, issue.9, pp.317-337, 2010.
DOI : 10.1002/nem.750

URL : https://hal.archives-ouvertes.fr/ensl-00488248

J. François, G. C. Moura, and A. Pras, Cleaning Your House First: Shifting the Paradigm on How to Secure Networks, Proceedings of the 5th International Conference on Autonomous Infrastructure, Management, and Security: Managing the Dynamics of Networks and Services, pp.1-12, 2011.
DOI : 10.1007/978-3-642-21484-4_1

C. M. Inacio and B. Trammell, YAF: Yet Another Flowmeter, Proceedings of the 24th international conference on Large installation system administration. pp. 1? 16. LISA'10, USENIX Association, 2010.

H. Kim, K. Claffy, M. Fomenkov, D. Barman, M. Faloutsos et al., Internet traffic classification demystified, Proceedings of the 2008 ACM CoNEXT Conference on, CONEXT '08, pp.1-11, 2008.
DOI : 10.1145/1544012.1544023

V. Krmicek, J. Vykopal, and R. Krejci, Netflow based system for NAT detection, Proceedings of the 5th international student workshop on Emerging networking experiments and technologies, Co-Next Student Workshop '09, 2009.
DOI : 10.1145/1658997.1659010

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

J. Mchugh, R. Mcleod, and V. Nagaonkar, Passive network forensics, ACM SIGOPS Operating Systems Review, vol.42, issue.3, pp.99-111, 2008.
DOI : 10.1145/1368506.1368520

N. Melnikov and J. Schönwälder, Cybermetrics: User Identification through Network Flow Analysis, Lecture Notes in Computer Science, vol.6155, pp.167-170, 2010.
DOI : 10.1007/978-3-642-13986-4_24

URL : https://hal.archives-ouvertes.fr/hal-01056631

H. Ringberg, M. Roughan, and J. Rexford, The need for simulation in evaluating anomaly detectors, ACM SIGCOMM Computer Communication Review, vol.38, issue.1, pp.55-59, 2008.
DOI : 10.1145/1341431.1341443

S. Stolfo, W. Fan, W. Lee, A. Prodromidis, and P. Chan, Cost-based modeling for fraud and intrusion detection: results from the JAM project, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00, pp.130-144, 2000.
DOI : 10.1109/DISCEX.2000.821515

L. C. Thomas, J. Crook, and D. Edelman, Credit Scoring and Its Applications, Society for Industrial and Applied Mathematics, 2002.
DOI : 10.1137/1.9780898718317

P. Velan, T. Jirsík, and P. Celeda, Design and Evaluation of HTTP Protocol Parsers for IPFIX Measurement, Advances in Communication Networking, pp.136-147, 2013.
DOI : 10.1007/978-3-642-40552-5_13

URL : https://hal.archives-ouvertes.fr/hal-01497010