P. Chen, L. Desmet, and C. Huygens, A Study on Advanced Persistent Threats, Communications and Multimedia Security, ser. Lecture Notes in Computer Science, pp.63-72
DOI : 10.1007/978-3-662-44885-4_5

URL : https://hal.archives-ouvertes.fr/hal-01404186

E. Bou-harb, M. Debbabi, and C. Assi, A Time Series Approach for Inferring Orchestrated Probing Campaigns by Analyzing Darknet Traffic, 2015 10th International Conference on Availability, Reliability and Security, pp.180-185, 2015.
DOI : 10.1109/ARES.2015.9

C. Fachkha and M. Debbabi, Darknet as a Source of Cyber Intelligence: Survey, Taxonomy, and Characterization, IEEE Communications Surveys & Tutorials, vol.18, issue.2, pp.1197-1227, 2016.
DOI : 10.1109/COMST.2015.2497690

Z. Durumeric, E. Wustrow, and J. A. Halderman, Zmap: Fast internet-wide scanning and its security applications, Usenix Security, 2013.

E. Isa and N. Sklavos, Smart home automation: Gsm security system design & implementation, 3rd Conference on Electronics and Telecommunications (PACET15), 2015.

R. Bodenheim, J. Butts, S. Dunlap, and B. Mullins, Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices, International Journal of Critical Infrastructure Protection, vol.7, issue.2, pp.114-123, 2014.
DOI : 10.1016/j.ijcip.2014.03.001

R. D. Graham, Masscan: Mass ip port scanner URL: https://github. com/robertdavidgraham/masscan, 2014.

Z. Durumeric, M. Bailey, and J. A. Halderman, An internet-wide view of internet-wide scanning, 23rd USENIX Security Symposium (USENIX Security 14), pp.65-78, 2014.

D. Leonard, Z. Yao, X. Wang, and D. Loguinov, Stochastic analysis of horizontal IP scanning, 2012 Proceedings IEEE INFOCOM, pp.2077-2085, 2012.
DOI : 10.1109/INFCOM.2012.6195589

J. Mazel, R. Fontugne, and K. Fukuda, Identifying coordination of network scans using probed address structure, Traffic Monitoring and Analysis -8th International Workshop, 2016.

A. Sperotto, R. Sadre, P. De-boer, and A. Pras, Hidden Markov Model Modeling of SSH Brute-Force Attacks, International Workshop on Distributed Systems: Operations and Management, pp.164-176, 2009.
DOI : 10.1007/978-3-642-04989-7_13

Z. Li, A. Goyal, and Y. Chen, Honeynet-based Botnet Scan Traffic Analysis, Botnet Detection, pp.25-44, 2008.
DOI : 10.1007/978-0-387-68768-1_2