« A signal analysis of network traffic anomalies, Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, IMW '02, pp.71-82, 2002. ,
« Aberrant Behavior Detection in Time Series for Network Monitoring, Proceedings of the 14th USENIX conference on System administration, pp.139-146 ,
« Sub-Space Clustering and Evidence Accumulation for Unsupervised Anomaly Detection in IP Networks, 2010. ,
« Traffic data repository at the WIDE project, Proceedings of the annual conference on USENIX Annual Technical Conference, ATEC '00, pp.51-51 ,
What's new : finding significant differences in network data streams », Networking, IEEE/ACM Transactions on, vol.13, issue.6, pp.1219-1232, 2005. ,
« Extracting hidden anomalies using sketch and non Gaussian multiresolution statistical detection procedures, Proceedings of the 2007 workshop on Large scale attack defense, LSAD '07, pp.145-152, 2007. ,
Geometric Framework for Unsupervised Anomaly Detection : Detecting Intrusions in Unlabeled Data, 2002. ,
« A density-based algorithm for discovering clusters in large spatial databases with noise, pp.226-231, 1996. ,
« Automated Classification of Network Traffic Anomalies, Proceedings SecurComm'09, 2009. ,
combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking, Proceedings of the 6th International COnference, pp.8-9, 2010. ,
« Combining Multiple Clusterings Using Evidence Accumulation, IEEE Trans. Pattern Anal. Mach. Intell, vol.27, pp.835-850, 2005. ,
« Exploiting generative models in discriminative classifiers, Proceedings of the 1998 conference on Advances in neural information processing systems II, pp.487-493, 1999. ,
Data clustering: 50 years beyond K-means, Pattern Recognition Letters, vol.31, issue.8, pp.651-666, 2010. ,
DOI : 10.1016/j.patrec.2009.09.011
Sketch-based change detection, Proceedings of the 2003 ACM SIGCOMM conference on Internet measurement , IMC '03, pp.234-247, 2003. ,
DOI : 10.1145/948205.948236
« Diagnosing network-wide traffic anomalies, Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications, SIGCOMM '04, pp.219-230, 2004. ,
« Mining anomalies using traffic feature distributions, Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications, SIGCOMM '05, pp.217-228, 2005. ,
« Unsupervised anomaly detection in network intrusion detection using clusters, Proceedings of the Twenty-eighth Australasian conference on Computer Science, pp.333-342, 2005. ,
« Subspace clustering for high dimensional data : a review, Explor. Newsl, vol.6, pp.90-105, 2004. ,
« Intrusion detection with unlabeled data using clustering, Proceedings of ACM CSS Workshop on Data Mining Applied to Security, pp.5-8, 2001. ,
Combining filtering and statistical methods for anomaly detection, Proceedings of the 5th ACM SIGCOMM conference on Internet measurement , IMC '05, pp.331-344 ,
DOI : 10.1145/1330107.1330147
URL : https://hal.archives-ouvertes.fr/hal-01489028
« Cluster ensembles ? a knowledge reuse framework for combining multiple partitions, J. Mach. Learn. Res, vol.3, pp.583-617, 2003. ,