A. Callado, C. Kamienski, G. Szabó, B. P. Gero, J. Kelner et al., A Survey on Internet Traffic Identification, IEEE Communications Surveys & Tutorials, vol.11, issue.3, pp.37-52, 2009.
DOI : 10.1109/SURV.2009.090304

U. Franke and J. Brynielsson, Cyber situational awareness ??? A systematic review of the literature, Computers & Security, vol.46, pp.18-31, 2014.
DOI : 10.1016/j.cose.2014.06.008

R. Hofstede, P. ?eleda, B. Trammell, I. Drago, R. Sadre et al., Flow Monitoring Explained: From Packet Capture to Data Analysis With NetFlow and IPFIX, IEEE Communications Surveys & Tutorials, vol.16, issue.4, pp.2037-2064, 2014.
DOI : 10.1109/COMST.2014.2321898

URL : http://porto.polito.it/2658703/1/tutorial.pdf

M. Husák, M. ?ermák, T. Jirsík, and P. ?eleda, HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting, EURASIP Journal on Information Security, vol.16, issue.4, 2016.
DOI : 10.1007/978-3-642-40552-5_13

A. Kim and M. H. Kang, Determining Asset Criticality for Cyber Defense, 2011.
DOI : 10.21236/ADA550373

URL : http://www.dtic.mil/dtic/tr/fulltext/u2/a550373.pdf

A. Kott, C. Wang, and R. F. Erbacher, Cyber Defense and Situational Awareness, pp.978-981, 2014.
DOI : 10.1007/978-3-319-11391-3

E. Meshkova, J. Riihijärvi, M. Petrova, and P. Mähönen, A survey on resource discovery mechanisms, peer-to-peer and service discovery frameworks, Computer Networks, vol.52, issue.11, pp.2097-2128, 2008.
DOI : 10.1016/j.comnet.2008.03.006

E. Weintraub and Y. Cohen, Continuous Monitoring System Based on Systems's Environment, Proceedings of the Conference on Digital Forensics, Security and Law. p. 151. Association of Digital Forensics, 2015.

A. Zand, A. Houmansadr, G. Vigna, R. Kemmerer, and C. Kruegel, Know Your Achilles' Heel, Proceedings of the 31st Annual Computer Security Applications Conference on, ACSAC 2015, pp.41-50, 2015.
DOI : 10.1109/INFOCOM.2014.6848158

S. Zander, T. Nguyen, and G. Armitage, Automated traffic classification and application identification using machine learning, The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l, pp.250-257, 2005.
DOI : 10.1109/LCN.2005.35

URL : http://researchrepository.murdoch.edu.au/id/eprint/35006/1/automated%20traffic.pdf

J. Zhang, C. Chen, Y. Xiang, and W. Zhou, Robust network traffic identification with unknown applications, Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, ASIA CCS '13, pp.405-414, 2013.
DOI : 10.1145/2484313.2484366