N. Duffield, P. Haffner, B. Krishnamurthy, and H. Ringberg. Rule-based anomaly detection on IP flows. In IEEE INFOCOM 2009, pages 424-432, 2009.
M. Elhoseny, A. Shehab, and L. Osman. An empirical analysis of user behavior for p2p iptv workloads. In A. E. Hassanien, M. F. Tolba, M. Elhoseny, and M. Mostafa, editors, The International Conference on Advanced Machine Learning Technologies and Applications (AMLTA2018), pages 252-263, 2018.
M. S. Farash. Security analysis and enhancements of an improved authentication for session initiation protocol with provable security. Peer-to-Peer Networking and Applications, 9 (1): 82-91, Jan 2016.
N. Hubballi and V. Suryanarayanan. Review: False alarm minimization techniques in signature-based intrusion detection systems: A survey. Comput. Commun., 49: 1-17, Aug. 2014.
G. Kaiafas, G. Varisteas, S. Lagraa, R. State, C. D. Nguyen, T. Ries, and M. Ourdane. Detecting malicious authentication events trustfully. In 2018 IEEE/IFIP Network Operations and Management Symposium, NOMS, pages 1-6, 2018.
M. Y. Kao. Encyclopedia of Algorithms. Springer-Verlag, Berlin, Heidelberg, 2007.
A. D. Kent. Comprehensive, Multi-Source Cyber-Security Events. Los Alamos National Laboratory, 2015.
A. D. Kent. Cybersecurity data sources for dynamic network research. In Dynamic Networks in Cybersecurity. Imperial College Press, 2015.
S. Lagraa and J. François. Knowledge discovery of port scans from darknet. In 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), pages 935-940, 2017.
S. Lagraa, J. François, A. Lahmadi, M. Miner, C. A. Hammerschmidt, and R. State. Botgm: Unsupervised graph mining to detect botnets in traffic flows. In 1st Cyber Security in Networking Conference, CSNet 2017, pages 1-8, 2017.
E. Lopze and K. Sartipi. feature engineering in big data for detection of information system misuse. IBM/ACM, 2018.
J. Navarro, V. Legrand, S. Lagraa, J. François, A. Lahmadi, G. D. Santis, O. Festor, N. Lammari, F. Hamdi, A. Deruyver, Q. Goux, M. Allard, and P. Parrend. Huma: A multi-layer framework for threat analysis in a heterogeneous log environment. In Foundations and Practice of Security-10th International Symposium, FPS, pages 144-159, 2017.
D. Stevanovic, N. Vlajic, and A. An. Detection of malicious and nonmalicious website visitors using unsupervised neural network learning. Applied Soft Computing, 13 (1): 698-708, 2013.