An Internet-Wide View of Internet-Wide Scanning, pp.65-78, 2014. ,
A Statistical Approach for Fingerprinting Probing Activities, 2013 International Conference on Availability, Reliability and Security, pp.21-30, 2013. ,
DOI : 10.1109/ares.2013.9
A proposal of malware distinction method based on scan patterns using spectrum analysis, Neural Information Processing, pp.565-572, 2009. ,
Honeynet-based botnet scan traffic analysis, Botnet Detection, pp.25-44, 2008. ,
DOI : 10.1007/978-0-387-68768-1_2
Analysis of a "/0" Stealth Scan from a Botnet, Proceedings of the 2012 Internet Measurement Conference, ser. IMC '12, pp.1-14, 2012. ,
Correlations Between Quiescent Ports in Network Flows, p.5, 2005. ,
Knowledge discovery of port scans from darknet, p.2017 ,
DOI : 10.23919/inm.2017.7987415
URL : https://hal.archives-ouvertes.fr/hal-01636215
, IFIP/IEEE Symposium, pp.935-940, 2017.
Characterizing honeypot-captured cyber attacks: Statistical framework and case study, IEEE Transactions on Information Forensics and Security, vol.8, issue.11, pp.1775-1789, 2013. ,
DOI : 10.1109/tifs.2013.2279800
URL : http://arxiv.org/pdf/1603.07433
, Predicting cyber attack rates with extreme values, IEEE Transactions on Information Forensics and Security, vol.10, issue.8, pp.1666-1677, 2015.