A. Ahmim, L. Maglaras, M. A. Ferrag, M. Derdour, and H. Janicke, A novel hierarchical intrusion detection system based on decision tree and rules-based models, 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), 2019.

M. Al-qatf, Y. Lasheng, M. Al-habib, and K. Al-sabahi, Deep learning approach combining sparse autoencoder with SVM for network intrusion detection, IEEE Access, 2018.

C. Anagnostopoulos, Weakly supervised learning: How to engineer labels for machine learning in cyber-security, Data Science for Cyber-Security, 2018.

G. Andresini, A. Appice, N. Di-mauro, C. Loglisci, and D. Malerba, Exploiting the auto-encoder residual error for intrusion detection, IEEE European Symposium on Security and Privacy Workshops, 2019.

H. Attias, A variational baysian framework for graphical models, Advances in neural information processing systems, 2000.

R. C. Aygun and A. G. Yavuz, Network anomaly detection with stochastically improved autoencoder based models, IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud, 2017.

M. Bahrololum and M. Khaleghi, Anomaly intrusion detection system using hierarchical gaussian mixture model, International journal of computer science and network security, 2008.

S. Barnum, R. Martin, B. Worrell, and I. Kirillov, The cybox language specification. draft, The MITRE Corporation, 2012.

I. L. Bastos, V. H. Melo, G. R. Gonçalves, and W. R. Schwartz, Mora: A generative approach to extract spatiotemporal information applied to gesture recognition, 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), 2018.

A. P. Dempster, N. M. Laird, and D. B. Rubin, Maximum likelihood from incomplete data via the EM algorithm, Journal of the Royal Statistical Society: Series B (Methodological, 1977.

M. A. Ferrag, L. Maglaras, S. Moschoyiannis, and H. Janicke, Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study, Journal of Information Security and Applications, 2020.

J. François, S. Wang, and T. Engel, Bottrack: tracking botnets using netflow and pagerank, International Conference on Research in Networking, 2011.

A. Gharib, I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, An evaluation framework for intrusion detection dataset, International Conference on Information Science and Security (ICISS), 2016.

A. Goel, K. Po, K. Farhadi, Z. Li, and E. De-lara, The taser intrusion recovery system, ACM SIGOPS Operating Systems Review, 2005.

I. Goodfellow, Y. Bengio, and A. Courville, Deep learning, 2016.

S. T. King and P. M. Chen, Backtracking intrusions, ACM SIGOPS Operating Systems Review, 2003.

S. Kobayashi, K. Otomo, K. Fukuda, and H. Esaki, Mining causality of network events in log data, IEEE Transactions on Network and Service Management, 2017.

S. Lagraa, J. François, A. Lahmadi, M. Miner, C. Hammerschmidt et al., Botgm: Unsupervised graph mining to detect botnets in traffic flows, 1st Cyber Security in Networking Conference (CSNet, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01636480

Y. Le-cun and F. Fogelman-soulié, Modèles connexionnistes de l'apprentissage, 1987.

F. Liu, Y. Wen, D. Zhang, X. Jiang, X. Xing et al., Log2vec: A heterogeneous graph embedding based approach for detecting cyber threats within enterprise, Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, 2019.

S. M. Milajerdi, R. Gjomemo, B. Eshete, R. Sekar, and V. Venkatakrishnan, Holmes: real-time apt detection through correlation of suspicious information flows, IEEE Symposium on Security and Privacy (SP), 2019.

E. Min, J. Long, Q. Liu, J. Cui, Z. Cai et al., SU-IDS: A semi-supervised and unsupervised framework for network intrusion detection, International Conference on Cloud Computing and Security, 2018.

S. Nagaraja, P. Mittal, C. Y. Hong, M. Caesar, and N. Borisov, Botgrep: Finding P2P bots with structured graph analysis. In: USENIX security symposium, 2010.

V. Paxson, Bro: a system for detecting network intruders in real-time, Computer networks, 1999.

K. Pei, Z. Gu, B. Saltaformaggio, S. Ma, F. Wang et al., Hercule: Attack story reconstruction via community discovery on correlated log graph, Proceedings of the 32th Annual Conference on Computer Security Applications, 2016.

M. A. Pimentel, D. A. Clifton, L. Clifton, and L. Tarassenko, A review of novelty detection, Signal Processing, 2014.

R. Pincus and V. Barnett, Outliers in statistical data. j. wiley & sons 1994, xvii. 582 pp.,£ 49.95, Biometrical Journal, 1995.

M. A. Rodriguez, The gremlin graph traversal machine and language, Proceedings of the 15th Symposium on Database Programming Languages, 2015.

J. Roux, E. Alata, G. Auriol, M. Kaâniche, V. Nicomette et al., Radiot: Radio communications intrusion detection for iot-a protocol independent approach, IEEE 17th International Symposium on Network Computing and Applications (NCA), 2018.
URL : https://hal.archives-ouvertes.fr/hal-01914981

K. Scarfone and P. Mell, Guide to intrusion detection and prevention systems (IDPS), 2012.

I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, Toward generating a new intrusion detection dataset and intrusion traffic characterization, 2018.

Z. Xu, Z. Wu, Z. Li, K. Jee, J. Rhee et al., High fidelity data reduction for big data security dependency analyses, ACM SIGSAC Conference on Computer and Communications Security, 2016.

M. Yisroel, D. Tomer, E. Yuval, and S. Asaf, Kitsune: An ensemble of autoencoders for online network intrusion detection, Network and Distributed System Security Symposium (NDSS), 2018.