Large Scale Activity Monitoring for distributed honeynets, Second International Conference on Internet Monitoring and Protection (ICIMP 2007), p.6, 2007. ,
DOI : 10.1109/ICIMP.2007.24
URL : https://hal.archives-ouvertes.fr/inria-00172053
Tracking global wide configuration errors, IEEE / IST Workshop on Monitoring, Attack Detection and Mitigation, 2006. ,
URL : https://hal.archives-ouvertes.fr/inria-00107005
Scan Statistics on Enron Graphs, Computational and Mathematical Organization Theory, vol.52, issue.3, pp.229-247, 2005. ,
DOI : 10.1007/s10588-005-5378-z
Analytical network and system administration, 2004. ,
DOI : 10.1002/047086107X
On the Design and Use of Internet Sinks for Network Abuse Monitoring, 2004. ,
DOI : 10.1007/978-3-540-30143-1_8
The caida backscatter, 2004. ,
Internet Denial of Service : Attack and Defense Mechanisms, ser. Radia Perlman Computer Networking and Security, 2004. ,
Attack processes found on the Internet, NATO Research and technology symposium IST-041/RSY-013 " Adaptive Defence in Unclassified Networks, 2004. ,
A Pointillist Approach for Comparing Honeypots, DIMVA 2005, Conference on Detection of Intrusions and Malware & Vulnerability Assessment, 2005. ,
DOI : 10.1007/11506881_4
Repelling the Wily Hacker, 1994. ,
Honeypots, Proceedings of the 45th annual southeast regional conference on , ACM-SE 45, pp.321-326, 2007. ,
DOI : 10.1145/1233341.1233399
Honeypot-based forensics, AusCERT2004, AusCERT Asia Pacific Information technology Security Conference, 2004. ,
Inferring Internet denial-of-service activity, ACM Transactions on Computer Systems, vol.24, issue.2, pp.115-139, 2006. ,
DOI : 10.1145/1132026.1132027
On the spectral analysis of backscatter data, Hawaii International Conference on Statistics and Related Fields, 2004. ,
Defining and Evaluating Greynets (Sparse Darknets), The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l ,
DOI : 10.1109/LCN.2005.46
Statistical opportunities in network security, 35th Symposium on the interface, 2003. ,