F. Pouget, M. Dacier, and H. Debar, Attack processes found on the Internet, NATO Research and technology symposium IST-041/RSY- 013 "Adaptive Defence in Unclassified Networks, 2004.

V. Yegneswaran, P. Barford, and D. Plonka, On the Design and Use of Internet Sinks for Network Abuse Monitoring, 2004.
DOI : 10.1007/978-3-540-30143-1_8

D. Moore, C. Shannon, D. Brown, and G. M. Voekler, Inferring Internet denial-of-dervice activity, IEEE/ACM Transactions on Computer System (TOCS), 2006.

K. E. Giles, D. J. Marchette, and C. E. Priebe, On the spectral analysis of backscatter data, Hawaii International Conference on Statistics and Related Fields, 2004.

J. Mirkovic, S. Dietrich, D. Dittrich, and P. Reiher, Internet Denial of Service : Attack and Defense Mechanisms, ser. Radia Perlman Computer Networking and Security, 2004.

C. Shannon, D. Moore, and E. Aben, The caida backscatter, 2004.

F. Pouget and T. Holz, A Pointillist Approach for Comparing Honeypots, DIMVA 2005, Conference on Detection of Intrusions and Malware & Vulnerability Assessment, 2005.
DOI : 10.1007/11506881_4

F. Pouget and M. Dacier, Honeypot-based forensics, AusCERT2004, AusCERT Asia Pacific Information technology Security Conference, 2004.