V. Bahl, R. Chandra, A. Greenberg, S. Kandula, D. Maltz et al., Towards highly reliable enterprise network services via inference of multi-level dependencies, SIGCOMM, pp.13-24, 2007.

D. Brauckhoff, A. Wagner, and M. May, Flame: a flow-level anomaly modeling engine, Proceedings of the conference on Cyber security experimentation and test. USENIX Association, 2008.

C. Burges, A tutorial on support vector machines for pattern recognition, Data Mining and Knowledge Discovery, vol.2, issue.2, pp.121-167, 1998.
DOI : 10.1023/A:1009715923555

M. Collins and N. Duffy, Convolution kernels for natural language, Advances in Neural Information Processing Systems 14, pp.625-632, 2001.

C. Estan, Building better netflow, Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications, 2004.

R. Kaizaki, O. Nakamura, and J. Murai, Characteristics of Denial of Service Attacks on Internet Using AGURI, In: Information Networking Lecture Notes in Computer Science, vol.2662, pp.849-857, 2003.
DOI : 10.1007/978-3-540-45235-5_83

T. Karagiannis, K. Papagiannaki, and M. Faloutsos, BLINC: multilevel traffic classification in the dark, ACM Conference on Applications, technologies, architectures , and protocols for computer communications (SIGCOMM), 2005.

E. Karpilovsky, Quantifying the Extent of IPv6 Deployment, In: Lecture Notes in Computer Science, vol.5448, 2009.
DOI : 10.1007/978-3-540-79232-1_3

L. Khan, M. Awad, and B. Thuraisingham, A new intrusion detection system using support vector machines and hierarchical clustering, The VLDB Journal, vol.1, issue.2, pp.507-521, 2007.
DOI : 10.1007/s00778-006-0002-5

A. Lakhina, M. Crovella, and C. Diot, Mining anomalies using traffic feature distributions, In: ACM SIGCOMM', p.5, 2005.

W. Lee, S. Stolfo, and K. Mok, Mining in a data-flow environment, Proceedings of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '99, 1999.
DOI : 10.1145/312129.312212

H. Nguyen, S. Ohn, S. Chae, D. Song, and I. Lee, Optimizing Weighted Kernel Function for Support Vector Machine by Genetic Algorithm, MICAI 2006: Advances in Artificial Intelligence, pp.583-592, 2006.
DOI : 10.1007/11925231_55

I. Paredes-oliva, Portscan Detection with Sampled NetFlow, In: Lecture Notes in Computer Science, vol.5537, 2009.
DOI : 10.1007/978-3-642-01645-5_4

B. Schölkopf and A. Smola, Learning with Kernels: Support Vector Machines, Regularization , Optimization, and Beyond, 2001.

B. Schölkopf, J. C. Platt, J. C. Shawe-taylor, A. J. Smola, and R. C. Williamson, Estimating the Support of a High-Dimensional Distribution, Neural Computation, vol.6, issue.1, pp.1443-1471, 2001.
DOI : 10.1214/aos/1069362732

R. Sommer, NetFlow, Proceedings of the second ACM SIGCOMM Workshop on Internet measurment , IMW '02, 2002.
DOI : 10.1145/637201.637226

A. Sperotto, R. Sadre, D. F. Van-vliet, and A. Pras, A Labeled Data Set for Flow-Based Intrusion Detection, 2009.
DOI : 10.1007/978-3-642-04968-2_4

V. Vapnik, In: Statistical Learning Theory, 1998.

J. Vert, A tree kernel to analyze phylogenetic profiles, 2002.

C. Wagner, G. Wagener, R. State, A. Dulaunoy, and T. Engel, Game theory driven monitoring of spatial-aggregated IP-Flow records, 2010 International Conference on Network and Service Management, 2010.
DOI : 10.1109/CNSM.2010.5691265

C. Wagner, G. Wagener, R. State, A. Dulaunoy, and T. Engel, PeekKernelFlows, Proceedings of the Seventh International Symposium on Visualization for Cyber Security, VizSec '10, pp.52-57, 2010.
DOI : 10.1145/1850795.1850801

L. Wang, Support Vector Machines: Theory and Applications, Studies in Fuzziness and Soft Computing, 2005.
DOI : 10.1007/b95439

Y. Wang, J. Wong, and A. Miner, Anomaly intrusion detection using one class svm, Information Assurance Workshop Proceedings from the Fifth Annual IEEE SMC, pp.358-364, 2004.

Y. , R. Li, Z. Guan, X. Xu, and L. , An svm-based machine learning method for accurate internet traffic classification, Information Systems Frontiers, vol.12, pp.149-156, 2010.

B. Y. Zhang, J. P. Yin, J. B. Hao, D. X. Zhang, and S. Wang, Using Support Vector Machine to Detect Unknown Computer Viruses, International Journal of Computational Intelligence Research, vol.2, issue.1, 2006.
DOI : 10.5019/j.ijcir.2006.51