M. Celenk, T. Conley, J. Willis, and J. Graham, Anomaly detection and visualization using Fisher Discriminant clustering of network entropy, 2008 Third International Conference on Digital Information Management, pp.216-220, 2008.
DOI : 10.1109/ICDIM.2008.4746810

N. Dalvi, P. Domingos, . Mausam, S. Sanghai, and D. Verma, Adversarial classification, Proceedings of the 2004 ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '04, pp.99-108, 2004.
DOI : 10.1145/1014052.1014066

URL : http://ai.cs.washington.edu/www/media/papers/kdd04.pdf

L. Feinstein, D. Schnackenberg, R. Balupari, and D. Kindred, Statistical approaches to DDoS attack detection and response, Proceedings DARPA Information Survivability Conference and Exposition, pp.303-314, 2003.
DOI : 10.1109/DISCEX.2003.1194894

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

W. Lee and D. Xiang, Information-Theoretic Measures for Anomaly Detection, Proc. of IEEE Symposium on Security and Privacy, pp.130-143, 2001.

L. Li, J. Zhou, and N. Xiao, Information and Communications Security, DDos Attack Detection Algorithms based on Entropy Computing, pp.452-466, 2007.

D. Lowd and C. Meek, Adversarial learning, Proceeding of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining , KDD '05, pp.641-647, 2005.
DOI : 10.1145/1081870.1081950

G. Nychis, V. Sekar, D. G. Andersen, H. Kim, and H. Zhang, An empirical evaluation of entropy-based traffic anomaly detection, Proceedings of the 8th ACM SIGCOMM conference on Internet measurement conference, IMC '08, pp.151-156, 2008.
DOI : 10.1145/1452520.1452539

B. I. Rubinstein, B. Nelson, L. Huang, A. D. Joseph, S. H. Lau et al., ANTIDOTE, Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference, IMC '09, pp.1-14, 2009.
DOI : 10.1145/1644893.1644895

B. Tellenbach, M. Burkhart, D. Sornette, and T. Maillart, Beyond Shannon: Characterizing Internet Traffic with Generalized Entropy Metrics, pp.239-248, 2009.
DOI : 10.1145/637201.637242

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

A. Wagner and B. Plattner, Entropy Based Worm and Anomaly Detection in Fast IP Networks, 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05), pp.172-177, 2005.
DOI : 10.1109/WETICE.2005.35

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

A. Ziviani, A. T. Gomes, M. L. Monsores, and P. S. Rodrigues, Network anomaly detection using nonextensive entropy, IEEE Communications Letters, vol.11, issue.12, pp.1034-1036, 2007.
DOI : 10.1109/LCOMM.2007.070761