V. Barto?, Nemea: Framework for stream-wise analysis of network traffic, Tech. rep., CESNET, a.l.e, 2013.

V. Bartos and M. Zadnik, An analysis of correlations of intrusion alerts in an NREN, 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), pp.305-309, 2014.
DOI : 10.1109/CAMAD.2014.7033255

M. H. Bhuyan, Surveying Port Scans and Their Detection Methodologies, The Computer Journal, vol.54, issue.10, p.35, 2011.
DOI : 10.1093/comjnl/bxr035

T. Cejka and M. Svepes, Vertical Scan Detector README, https://github.com/ CESNET/Nemea-Detectors/tree

A. Dainotti, Analysis of a "/0" stealth scan from a botnet, Proceedings of the 2012 ACM conference on Internet measurement conference, IMC '12, pp.1-14, 2012.
DOI : 10.1145/2398776.2398778

J. Jung, Fast portscan detection using sequential hypothesis testing, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, pp.211-225, 2004.
DOI : 10.1109/SECPRI.2004.1301325

G. F. Lyon, Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning, Insecure, 2009.

N. Nethercote and J. Seward, Valgrind, ACM SIGPLAN Notices, vol.42, issue.6, pp.89-100, 2007.
DOI : 10.1145/1273442.1250746

URL : https://doi.org/10.1016/s1571-0661(04)81042-9

V. Paxson, Bro: a system for detecting network intruders in real-time, Computer Networks, vol.31, issue.23-24, pp.31-2435, 1999.
DOI : 10.1016/S1389-1286(99)00112-7

E. Raftopoulos, How Dangerous Is Internet Scanning?, Lecture Notes in Computer Science, vol.9053, pp.158-172, 2015.
DOI : 10.1007/978-3-319-17172-2_11

URL : https://hal.archives-ouvertes.fr/hal-01411192

M. Roesch, Snort: Lightweight intrusion detection for networks, pp.229-238, 1999.

A. Sridharan, T. Ye, and S. Bhattacharyya, Connectionless Port Scan Detection on the Backbone, 2006 IEEE International Performance Computing and Communications Conference, p.10, 2006.
DOI : 10.1109/.2006.1629454

URL : http://ipmon.sprintlabs.com/publications/uploads/malware2006-taps.pdf