, , 2014.
A data mining framework for building intrusion detection models, IEEE S&P, pp.120-132, 1999. ,
Automatically inferring the evolution of malicious activity on the internet, NDSS, 2013. ,
A sense of self for unix processes, IEEE S&P, pp.120-128, 1996. ,
Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data, Computers & Security, vol.25, issue.7, pp.539-550, 2006. ,
Drebin: Efficient and explainable detection of android malware in your pocket, NDSS, 2014. ,
Profiledroid: multilayer profiling of android applications, MOBICOM, pp.137-148, 2012. ,
Casting out demons: Sanitizing training data for anomaly sensors, IEEE S&P, pp.81-95, 2008. ,
Challenging the anomaly detection paradigm: a provocative discussion, NSPW, pp.21-29, 2006. ,
Approaches to online learning and concept drift for user identification in computer security, KDD, pp.259-263, 1998. ,
Kdd cup 1999 data (retrieved febuary 2014), 1999. ,
Adaptive diagnosis in distributed systems, IEEE Transactions on Neural Networks, vol.16, issue.5, pp.1088-1109, 2005. ,
Autonomic computing (retrieved febuary, 2014. ,
Clustering by passing messages between data points, Science, vol.315, issue.5814, pp.972-976, 2007. ,
Data streaming with affinity propagation, ECML/PKDD, 2008. ,
URL : https://hal.archives-ouvertes.fr/inria-00289679
Haystack: An intrusion detection system, Proceedings of the IEEE Fourth Aerospace Computer Security Applications Conference, 1988. ,
Detecting masquerades in intrusion detection based on unpopular commands, Inf. Process. Lett, vol.76, issue.1-2, pp.33-38, 2000. ,
Fast intrusion detection based on a non-negative matrix factorization model, J. Network and f Applications, vol.32, issue.1, pp.31-44, 2009. ,
Processing of massive audit data streams for real-time anomaly intrusion detection, Computer Communications, vol.31, issue.1, pp.58-72, 2008. ,
Anomalous payload-based network intrusion detection, RAID, pp.203-222, 2004. ,
Anomaly intrusion detection based on pls feature extraction and core vector machine, Knowl.-Based Syst, vol.40, pp.1-6, 2013. ,
Anomaly detection of web-based attacks, ACM CCS, pp.251-261, 2003. ,
Comparing anomaly detection techniques for http, RAID, pp.42-62, 2007. ,
Spectrogram: A mixtureof-markov-chains model for anomaly detection in web traffic, NDSS, 2009. ,
Hmmpayl: An intrusion detection system based on hidden markov models, Computers & Security, vol.30, issue.4, pp.221-241, 2011. ,
Warningbird: Detecting suspicious urls in twitter stream, NDSS, 2012. ,
Semantic security against web application attacks, Information Sciences, vol.254, issue.1, pp.19-38, 2014. ,
Policy-enhanced anfis model to counter soap-related attacks, Knowl.-Based Syst, vol.35, pp.64-76, 2012. ,
Discovering fuzzy association rule patterns and increasing sensitivity analysis of xml-related attacks, J. Network and Computer Applications, vol.36, issue.2, pp.829-842, 2013. ,
Defending web services against denial of service attacks using client puzzles, ICWS, pp.25-32, 2011. ,
Fuzzy rule-base based intrusion detection system on application layer, CNSA, pp.27-36, 2010. ,
A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data. Applications of Data Mining in Computer Security, 2002. ,
Intrusion detection with unlabeled data using clustering, 2001. ,
Unsupervised anomaly detection in network intrusion detection using clusters, Proc. 28th Australasian CS Conf., volume, vol.38, pp.333-342, 2005. ,
Adaptive anomaly detection via self-calibration and dynamic updating, RAID, pp.41-60, 2009. ,
Runtime monitoring and dynamic reconfiguration for intrusion detection systems, RAID, pp.61-80, 2009. ,
Adaptive and online data anomaly detection for wireless sensor systems. Knowledge-Based Systems, available online first, 2014. ,
An adaptive automatically tuning intrusion detection system, ACM Trans. Autonomous and Adaptive Systems, vol.3, issue.3, 2008. ,
Protecting a moving target: Addressing web application concept drift, RAID, pp.21-40, 2009. ,
Effective anomaly detection with scarce training data, NDSS, 2010. ,
A general framework for adaptive and online detection of web attacks, WWW, pp.1141-1142, 2009. ,
URL : https://hal.archives-ouvertes.fr/inria-00461391
Data stream clustering with affinity propagation, IEEE Transactions on Knowledge and Data Engineering, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-00862941
Knowledge Discovery from Data Streams, 2010. ,
Data Clustering: Algorithms and Applications, 2013. ,
Sequential karhunen-loeve basis extraction and its application to images, IEEE Transactions on Image Processing, vol.9, pp.1371-1374, 2000. ,
Using text categorization techniques for intrusion detection, USENIX Security Symposium, pp.51-59, 2002. ,
Constructing attribute weights from computer audit data for effective intrusion detection, J. Sys. and Soft, vol.82, issue.12, pp.1974-1981, 2009. ,
Estimating the support of a high-dimensional distribution, Neural Computation, vol.13, issue.7, pp.1443-1471, 2001. ,
Principal Component Analysis, 2002. ,
, , 2004.
Using generalization and characterization techniques in the anomaly-based detection of web attacks, NDSS, 2006. ,
LIBSVM: A library for support vector machines, ACM Transactions on Intelligent Systems and Technology, vol.2, pp.1-27, 2011. ,
Toward autonomic grids: analyzing the job flow with affinity streaming, KDD, pp.987-996, 2009. ,
URL : https://hal.archives-ouvertes.fr/inria-00393825
Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory, ACM Trans. Inf. Syst. Secur, vol.3, issue.4, pp.262-294, 2000. ,
Attribute normalization in network intrusion detection, ISPAN, pp.448-453, 2009. ,
URL : https://hal.archives-ouvertes.fr/hal-00725642