Standardizing cyber threat intelligence information with the structured threat information expression (stix), MITRE Corporation, vol.11, pp.1-22, 2012. ,
The cybox language specification. draft, The MITRE Corporation, 2012. ,
Csrf: Attack and defense. McAfee® Foundstone® Professional Services, 2007. ,
Fast unfolding of communities in large networks, Journal of statistical mechanics: theory and experiment, issue.10, p.10008, 2008. ,
URL : https://hal.archives-ouvertes.fr/hal-01146070
Apache cassandra. Website, p.13, 2014. ,
Finding community structure in very large networks, Physical review E, vol.70, issue.6, p.66111, 2004. ,
Bottrack: tracking botnets using netflow and pagerank, International Conference on Research in Networking, pp.1-14, 2011. ,
An evaluation framework for intrusion detection dataset, Information Science and Security (ICISS), 2016 International Conference on, pp.1-6, 2016. ,
Visualizing big network traffic data using frequent pattern mining and hypergraphs, Computing, vol.96, issue.1, pp.27-38, 2014. ,
The taser intrusion recovery system, ACM SIGOPS Operating Systems Review, vol.39, pp.163-176, 2005. ,
Sleuth: Realtime attack scenario reconstruction from cots audit data, Proc. USENIX Secur, pp.487-504, 2017. ,
A visualization scheme for network forensics based on attribute oriented induction based frequent item mining and hyper graph, International Conference on Digital Forensics and Cyber Crime, pp.130-143, 2017. ,
Guide to cyber threat information sharing, 2016. ,
Backtracking intrusions, ACM SIGOPS Operating Systems Review, vol.37, pp.223-236, 2003. ,
Mining causes of network events in log data with causal inference, Proc. IEEE IM, vol.17, pp.45-53, 2017. ,
Botgm: Unsupervised graph mining to detect botnets in traffic flows, 2017 1st Cyber Security in Networking Conference (CSNet), pp.1-8, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01636480
Visualization of host behavior for network security, pp.187-202, 2007. ,
Holmes: real-time apt detection through correlation of suspicious information flows, 2018. ,
Community detection: Comparison of state of the art algorithms, pp.125-129, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-02641009
Botgrep: Finding p2p bots with structured graph analysis, USENIX Security Symposium, vol.10, pp.95-110, 2010. ,
Fast algorithm for detecting community structure in networks, Physical review E, vol.69, issue.6, p.66133, 2004. ,
Cocoa: An ontology for cybersecurity operations centre analysis process, 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), pp.1-8, 2018. ,
Bro: a system for detecting network intruders in realtime, Computer networks, vol.31, pp.2435-2463, 1999. ,
Hercule: Attack story reconstruction via community discovery on correlated log graph, Proceedings of the 32Nd Annual Conference on Computer Security Applications, pp.583-595, 2016. ,
Computing communities in large networks using random walks, International symposium on computer and information sciences, pp.284-293, 2005. ,
Near linear time algorithm to detect community structures in large-scale networks, Physical review E, vol.76, issue.3, p.36106, 2007. ,
The gremlin graph traversal machine and language, Proceedings of the 15th Symposium on Database Programming Languages, pp.1-10, 2015. ,
Maps of random walks on complex networks reveal community structure, Proceedings of the National Academy of Sciences, vol.105, issue.4, pp.1118-1123, 2008. ,
Toward generating a new intrusion detection dataset and intrusion traffic characterization, ICISSP. pp, pp.108-116, 2018. ,
,
Community detection in networks with positive and negative links, Physical Review E, vol.80, issue.3, p.36115, 2009. ,
Discovering correlations: A formal definition of causal dependency among heterogeneous events, 2019 IEEE European Symposium on Security and Privacy (EuroS&P), pp.340-355, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02363431
High fidelity data reduction for big data security dependency analyses, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp.504-516, 2016. ,