J. Francois, R. State, and O. Festor, Large Scale Activity Monitoring for distributed honeynets, Second International Conference on Internet Monitoring and Protection (ICIMP 2007), p.6, 2007.
DOI : 10.1109/ICIMP.2007.24

URL : https://hal.archives-ouvertes.fr/inria-00172053

R. State, J. Francois, and O. Festor, Tracking global wide configuration errors, IEEE / IST Workshop on Monitoring, Attack Detection and Mitigation, 2006.
URL : https://hal.archives-ouvertes.fr/inria-00107005

C. E. Priebe, J. M. Conroy, D. J. Marchette, and Y. Park, Scan Statistics on Enron Graphs, Computational and Mathematical Organization Theory, vol.52, issue.3, pp.229-247, 2005.
DOI : 10.1007/s10588-005-5378-z

M. Burgess, Analytical network and system administration, 2004.
DOI : 10.1002/047086107X

V. Yegneswaran, P. Barford, and D. Plonka, On the Design and Use of Internet Sinks for Network Abuse Monitoring, 2004.
DOI : 10.1007/978-3-540-30143-1_8

C. Shannon, D. Moore, and E. Aben, The caida backscatter, 2004.

J. Mirkovic, S. Dietrich, D. Dittrich, and P. Reiher, Internet Denial of Service : Attack and Defense Mechanisms, ser. Radia Perlman Computer Networking and Security, 2004.

F. Pouget, M. Dacier, and H. Debar, Attack processes found on the Internet, NATO Research and technology symposium IST-041/RSY-013 " Adaptive Defence in Unclassified Networks, 2004.

F. Pouget and T. Holz, A Pointillist Approach for Comparing Honeypots, DIMVA 2005, Conference on Detection of Intrusions and Malware & Vulnerability Assessment, 2005.
DOI : 10.1007/11506881_4

A. R. Cheswick, F. Bellowin, I. Security, G. Roualland, and J. Saffroy, Repelling the Wily Hacker, 1994.

I. Mokube and M. Adams, Honeypots, Proceedings of the 45th annual southeast regional conference on , ACM-SE 45, pp.321-326, 2007.
DOI : 10.1145/1233341.1233399

F. Pouget and M. Dacier, Honeypot-based forensics, AusCERT2004, AusCERT Asia Pacific Information technology Security Conference, 2004.

D. Moore, C. Shannon, D. J. Brown, G. M. Voelker, and S. Savage, Inferring Internet denial-of-service activity, ACM Transactions on Computer Systems, vol.24, issue.2, pp.115-139, 2006.
DOI : 10.1145/1132026.1132027

K. E. Giles, D. J. Marchette, and C. E. Priebe, On the spectral analysis of backscatter data, Hawaii International Conference on Statistics and Related Fields, 2004.

W. Harrop and G. Armitage, Defining and Evaluating Greynets (Sparse Darknets), The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l
DOI : 10.1109/LCN.2005.46

D. J. Marchette, Statistical opportunities in network security, 35th Symposium on the interface, 2003.