K. Cho, R. Kaizaki, and A. Kato, Aguri: An Aggregation-Based Traffic Profiler, pp.222-242, 2001.
DOI : 10.1007/3-540-45412-8_16

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.24.9461

A. Culotta and J. Sorensen, Dependency tree kernels for relation extraction, Proceedings of the 42nd Annual Meeting on Association for Computational Linguistics , ACL '04, 2004.
DOI : 10.3115/1218955.1219009

URL : http://acl.ldc.upenn.edu/acl2004/main/pdf/244_pdf_2-col.pdf

C. Estan, Building a better NetFlow, Proceedings of the 2004 conference on Applications , technologies, architectures, and protocols for computer communications, pp.245-256, 2004.
DOI : 10.1145/1015467.1015495

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.2.9229

L. Kahn, M. Awad, and B. Thuraisungham, A new intrusion detection system using support vector machines and hierarchical clustering, The VLDB Journal, vol.1, issue.2, pp.507-521, 2007.
DOI : 10.1007/s00778-006-0002-5

R. Kaizaki, O. Nakamura, and J. Murai, Characteristics of Denial of Service Attacks on Internet Using AGURI, ICOIN 2003, pp.849-857, 2003.
DOI : 10.1007/978-3-540-45235-5_83

T. Karagiannis, K. Papagiannaki, and M. Faloutsos, BLINC: Multilevel Traffic Classification in the Dark, ACM SIGCOMM'05, 2005.

E. Karpilovsky, Quantifying the Extent of IPv6 Deployment, LNCS, vol.5448, pp.13-22, 2009.
DOI : 10.1007/978-3-540-79232-1_3

A. Lakhina, M. Crovella, and C. Diot, Mining Anomalies Using Traffic Feature Distributions, ACM SIGCOMM'05, 2005.
DOI : 10.1145/1080091.1080118

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.116.4156

A. Mcgregor, M. Hall, P. Lorier, and J. Brunskill, Flow Clustering using Machine Learning, 2004.

D. R. Morrison, PATRICIA---Practical Algorithm To Retrieve Information Coded in Alphanumeric, Journal of the ACM, vol.15, issue.4, pp.514-534, 1968.
DOI : 10.1145/321479.321481

I. Paredes-oliva, Portscan Detection with Sampled NetFlow, LNCS, vol.5537, pp.26-33, 2009.
DOI : 10.1007/978-3-642-01645-5_4

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.332.522

B. Schoelkopf and J. Smola, Learning with kernels. chap.1-3, 2002.

V. Vapnik, Statistical Learning Theory, 1998.

C. Wagner, J. François, R. State, and T. Engel, Machine Learning Approach for IP-Flow Record Anomaly Detection, 10th NETWORKING 2011, pp.28-39, 2011.
DOI : 10.1007/978-3-642-20757-0_3

URL : https://hal.archives-ouvertes.fr/inria-00613602