Z. Durumeric, M. Bailey, and J. A. Halderman, An Internet-Wide View of Internet-Wide Scanning, pp.65-78, 2014.

E. Bou-harb, M. Debbabi, and C. Assi, A Statistical Approach for Fingerprinting Probing Activities, 2013 International Conference on Availability, Reliability and Security, pp.21-30, 2013.
DOI : 10.1109/ares.2013.9

M. Eto, K. Sonoda, D. Inoue, K. Yoshioka, and K. Nakao, A proposal of malware distinction method based on scan patterns using spectrum analysis, Neural Information Processing, pp.565-572, 2009.

Z. Li, A. Goyal, and Y. Chen, Honeynet-based botnet scan traffic analysis, Botnet Detection, pp.25-44, 2008.
DOI : 10.1007/978-0-387-68768-1_2

A. Dainotti, A. King, F. Claffy, A. Papale, and . Pescapè, Analysis of a "/0" Stealth Scan from a Botnet, Proceedings of the 2012 Internet Measurement Conference, ser. IMC '12, pp.1-14, 2012.

J. Mcnutt and D. S. Markus, Correlations Between Quiescent Ports in Network Flows, p.5, 2005.

S. Lagraa and J. François, Knowledge discovery of port scans from darknet, p.2017
DOI : 10.23919/inm.2017.7987415

URL : https://hal.archives-ouvertes.fr/hal-01636215

, IFIP/IEEE Symposium, pp.935-940, 2017.

Z. Zhan, M. Xu, and S. Xu, Characterizing honeypot-captured cyber attacks: Statistical framework and case study, IEEE Transactions on Information Forensics and Security, vol.8, issue.11, pp.1775-1789, 2013.
DOI : 10.1109/tifs.2013.2279800

URL : http://arxiv.org/pdf/1603.07433

, Predicting cyber attack rates with extreme values, IEEE Transactions on Information Forensics and Security, vol.10, issue.8, pp.1666-1677, 2015.