botcloud an emerging platform for cyber-attacks, 2012. ,
Botclouds -the future of cloud-based botnets?, Proceedings of the 1st International Conference on Cloud Computing and Services Science, pp.597-603, 2011. ,
Survey of network-based defense mechanisms countering the DoS and DDoS problems, ACM Computing Surveys, vol.39, issue.1, 2007. ,
DOI : 10.1145/1216370.1216373
UBL, Proceedings of the 9th international conference on Autonomic computing, ICAC '12, pp.191-200, 2012. ,
DOI : 10.1145/2371536.2371572
FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks, IEEE/ACM Transactions on Networking, vol.20, issue.6, pp.1828-1841, 2012. ,
DOI : 10.1109/TNET.2012.2194508
When gossip is good: Distributed probabilistic inference for detection of slow network intrusions, Proceedings of the 21st National Conference on Artificial Intelligence, pp.1115-1122, 2006. ,
A peer-to-peer collaborative intrusion detection system, Networks, 2005. Jointly held with the 2005 IEEE 7th Malaysia International Conference on Communication. 13th IEEE International Conference on, p.6, 2005. ,
Dependency-based distributed intrusion detection, Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test on DETER Community Workshop on Cyber Security Experimentation and Test, pp.8-8, 2007. ,
D-ward: a source-end defense against flooding denialof-service attacks. Dependable and Secure Computing, IEEE Transactions on, vol.2, issue.3, pp.216-232, 2005. ,
DOI : 10.1109/tdsc.2005.35
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.103.5127
Understanding botclouds from a system perspective: A principal component analysis, 2014 IEEE Network Operations and Management Symposium (NOMS), 2014. ,
DOI : 10.1109/NOMS.2014.6838310
A factorial space for a system-based detection of botcloud activity, Sixth IFIP International Conference on New Technologies, Mobility and Security (NTMS'2014), 2014. ,
PlanetLab, ACM SIGCOMM Computer Communication Review, vol.33, issue.3, pp.3-12, 2003. ,
DOI : 10.1145/956993.956995
Privacy Regulations for Cloud Computing: Compliance and Implementation in Theory and Practice, Computers, Privacy and Data Protection: an Element of Choice, pp.361-376, 2011. ,
DOI : 10.1007/978-94-007-0641-5_17
Principal component analysis. Chemometrics and Intelligent Laboratory Systems, Proceedings of the Multivariate Statistical Workshop for Geologists and Geochemists, pp.37-52, 1987. ,
A novel anomaly detection scheme based on principal component classifier, 2003. ,
Applying PCA for Traffic Anomaly Detection: Problems and Solutions, IEEE INFOCOM 2009, The 28th Conference on Computer Communications, pp.2866-2870, 2009. ,
DOI : 10.1109/INFCOM.2009.5062248
URL : https://hal.archives-ouvertes.fr/hal-00620090
Anomaly detection via online oversampling principal component analysis. Knowledge and Data Engineering, IEEE Transactions on, vol.25, issue.7, pp.1460-1470, 2013. ,
DOI : 10.1109/tkde.2012.99
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.684.4521
Matrix analysis and applied linear algebra, 2000. ,
Assessing the accuracy of prediction algorithms for classification: an overview, Bioinformatics, vol.16, issue.5, pp.412-424, 2000. ,
DOI : 10.1093/bioinformatics/16.5.412