Network Anomaly Detection: Methods, Systems and Tools, IEEE Communications Surveys & Tutorials, vol.16, issue.1, pp.303-336, 2014. ,
DOI : 10.1109/SURV.2013.052213.00046
The Operational Role of Security Information and Event Management Systems, IEEE Security & Privacy, vol.12, issue.5, pp.35-41, 2014. ,
DOI : 10.1109/MSP.2014.103
Characteristics of internet background radiation, Proceedings of the 4th ACM SIGCOMM conference on Internet measurement , IMC '04, pp.27-40, 2004. ,
DOI : 10.1145/1028788.1028794
Darknet as a Source of Cyber Intelligence: Survey, Taxonomy, and Characterization, IEEE Communications Surveys & Tutorials, vol.18, issue.2, pp.1197-1227, 2016. ,
DOI : 10.1109/COMST.2015.2497690
Topology and data, Bulletin of the American Mathematical Society, vol.46, issue.2, pp.255-308, 2009. ,
DOI : 10.1090/S0273-0979-09-01249-X
Internet background radiation revisited, Proceedings of the 10th annual conference on Internet measurement, IMC '10, pp.62-74, 2010. ,
DOI : 10.1145/1879141.1879149
Inferring Internet denial-of-service activity, ACM Transactions on Computer Systems, vol.24, issue.2, 2006. ,
DOI : 10.1145/1132026.1132027
Activity Monitoring for large honeynets and network telescopes, International Journal On Advances in Systems and Measurements, pp.1-13, 2008. ,
Askoxylakis, and A. Fragkiadakis, A Network Telescope for Early Warning Intrusion Detection, 2014. ,
Supervised learning to detect DDoS attacks, 2014 IEEE Symposium on Computational Intelligence in Cyber Security (CICS), pp.1-8, 2014. ,
DOI : 10.1109/CICYBS.2014.7013367
Inferring distributed reflection denial of service attacks from darknet, Computer Communications, vol.62, pp.59-71, 2015. ,
DOI : 10.1016/j.comcom.2015.01.016
A Survey on Information Visualization for Network and Service Management, IEEE Communications Surveys & Tutorials, vol.18, issue.1, pp.285-323, 2016. ,
DOI : 10.1109/COMST.2015.2450538
InetVis, a visual tool for network telescope traffic analysis, Proceedings of the 4th international conference on Computer graphics, virtual reality, visualisation and interaction in Africa , Afrigaph '06, 2006. ,
DOI : 10.1145/1108590.1108604
Using InetVis to Evaluate Snort and Bro Scan Detection on a Network Telescope, Proceedings of the Workshop on Visualization for Computer Security, 2008. ,
DOI : 10.1007/978-3-540-78243-8_17
Daedalusviz: Novel real-time 3d visualization for darknet monitoring-based alert system, Proceedings of the Ninth International Symposium on Visualization for Cyber Security, pp.72-79, 2012. ,
Topological data analysis: A promising big data exploration tool in biology, analytical chemistry and physical chemistry, Analytica Chimica Acta, vol.910, pp.1-11, 2016. ,
DOI : 10.1016/j.aca.2015.12.037
URL : https://hal.archives-ouvertes.fr/hal-01285628
Topological Methods for the Analysis of High Dimensional Data Sets and 3D Object Recognition, Eurographics Symposium on Point-Based Graphics. The Eurographics Association, 2007. ,
A density-based algorithm for discovering clusters in large spatial databases with noise, pp.226-231, 1996. ,
TDAmapper: Analyze High-Dimensional Data Using Discrete Morse Theory , 2015, r package version 1.0. [Online] Available: https://github ,
P3D: A parallel 3D coordinate visualization for advanced network scans, 2013 IEEE International Conference on Communications (ICC), pp.2052-2057, 2013. ,
DOI : 10.1109/ICC.2013.6654828