B. Claise, Cisco Systems NetFlow Services Export Version 9, RFCInformational ), vol.3954, 2004.
DOI : 10.17487/rfc3954

G. Sadasivan, N. Brownlee, B. Claise, and J. Quittek, Architecture for IP Flow Information Export, RFC, vol.5470, 2009.
DOI : 10.17487/rfc5470

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.182.6749

J. Quittek, T. Zseby, B. Claise, and S. Zander, Requirements for IP Flow Information Export (IPFIX), RFCInformational), vol.3917, 2004.
DOI : 10.17487/rfc3917

A. Sperotto, G. Schaffrath, R. Sadre, C. Morariu, A. Pras et al., An Overview of IP Flow-Based Intrusion Detection, IEEE Communications Surveys & Tutorials, vol.12, issue.3, pp.343-356, 2010.
DOI : 10.1109/SURV.2010.032210.00054

A. Sperotto, R. Sadre, P. T. De-boer, and A. Pras, Hidden Markov Model Modeling of SSH Brute-Force Attacks, Proceedings of the 20th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, 2009.
DOI : 10.1007/978-3-642-04989-7_13

A. Sperotto, Flow-Based Intrusion Detection, 2010.
URL : https://hal.archives-ouvertes.fr/hal-01529782

M. S. Kim, H. J. Kong, S. C. Hong, S. H. Chung, and J. Hong, A Flow-based Method for Abnormal Network Traffic Detection, Proceedings of IEEE/IFIP Network Operations and Management Symposium, pp.599-612, 2004.

J. Vykopal, T. Plesnik, and P. Minarik, Network-Based Dictionary Attack Detection, 2009 International Conference on Future Networks, pp.23-27, 2009.
DOI : 10.1109/ICFN.2009.36

G. Münz and G. Carle, Real-time Analysis of Flow Data for Network Attack Detection, 2007 10th IFIP/IEEE International Symposium on Integrated Network Management, pp.100-108, 2007.
DOI : 10.1109/INM.2007.374774

. Surfmap, http://surfmap.sourceforge.net/ (2012) Accessed on, 2012.

R. Hofstede and T. Fioreze, SURFmap: A network monitoring tool based on the Google Maps API, 2009 IFIP/IEEE International Symposium on Integrated Network Management, pp.676-690, 2009.
DOI : 10.1109/INM.2009.5188876