Dynamic defense strategy against advanced persistent threat with insiders, IEEE Conference on Computer Communications (INFOCOM), pp.747-755, 2015. ,
Bro: a System for Detecting Network Intruders in RealTime, Computer Networks, vol.31, issue.23-24, pp.2435-2463, 1999. ,
Snort-Lightweight Intrusion Detection for Networks, Proceedings of the 13th USENIX conference on System administration. USENIX Association, pp.229-238, 1999. ,
The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware, Recent Advances in Intrusion Detection, pp.107-126, 2007. ,
Largescale network traffic monitoring with DBStream, a system for rolling big data analysis, 2014 IEEE International Conference on Big Data (Big Data), pp.165-170, 2014. ,
The 8 requirements of real-time stream processing, ACM SIGMOD Record, vol.34, issue.4, pp.42-47, 2005. ,
Use of machine learning in big data analytics for insider threat detection, IEEE Military Communications Conference, MILCOM, pp.915-922, 2015. ,
Feature Selection for Dimensionality Reduction, Subspace, Latent Structure and Feature Selection (SLSFS): Statistical and Optimization Perspectives Workshop, pp.84-102, 2006. ,
Big data stream learning with samoa, 2014 IEEE International Conference on Data Mining Workshop, pp.1199-1202, 2014. ,
Discussion and review on evolving data streams and concept drift adapting, Evolving systems, vol.9, issue.1, pp.1-23, 2018. ,
Data cleaning: Problems and current approaches, IEEE Bulletin of the Technical Committee on Data Engineering, vol.23, issue.4, pp.3-13, 2000. ,
Data preprocessing in data mining, 2016. ,
Theoretical and Empirical Analysis of ReliefF and RReliefF, Machine Learning, vol.53, pp.23-69, 2003. ,
Kernel principal component analysis, Advances in kernel methods, pp.327-352, 1999. ,
Tutorial on practical tips of the most influential data preprocessing algorithms in data mining, Knowledge-Based Systems, vol.98, pp.1-29, 2016. ,
Data preparation for data mining, Applied artificial intelligence, vol.17, issue.5-6, pp.375-381, 2003. ,
Neighbor-weighted k-nearest neighbor for unbalanced text corpus, Expert Systems with Applications, vol.28, issue.4, pp.667-671, 2005. ,
A survey on data preprocessing for data stream mining: Current status and future directions, Neurocomputing, 2017. ,
Dimensionality reduction: a comparative, Journal of Machine Learning Research, vol.10, pp.66-71, 2009. ,
Supervised, Unsupervised, and Semi-Supervised Feature Selection: A Review on Gene Selection, IEEE/ACM Transactions on Computational Biology and Bioinformatics, vol.13, issue.5, pp.971-989, 2016. ,
A survey on feature selection methods, Computers & Electrical Engineering, vol.40, issue.1, pp.16-28, 2014. ,
Gene selection for cancer classification using support vector machines, Machine learning, vol.46, issue.1-3, pp.389-422, 2002. ,
Correlation-based Feature Selection for Machine Learning, 1999. ,
Data streaming algorithms for efficient and accurate estimation of flow size distribution, ACM SIGMETRICS Performance Evaluation Review, vol.32, issue.1, pp.177-188, 2004. ,
A streaming parallel decision tree algorithm, Journal of Machine Learning Research, vol.11, pp.849-872, 2010. ,
Contrary to popular belief incremental discretization can be sound, computationally efficient and extremely useful for streaming data, IEEE International Conference on Data Mining (ICDM) ,
, IEEE, pp.1031-1036, 2014.
A detailed analysis of the kdd cup 99 data set, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp.1-6, 2009. ,
An adaptive Real-Time architecture for ZeroDay threat detection, IEEE ICC 2018 Next Generation Networking and Internet Symposium (ICC'18 NGNI), 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-02099022
Collecting and characterizing a real broadband access network traffic dataset, IEEE/IFIP 1st Cyber Security in Networking Conference (CSNet), pp.1-8, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-02099033
Smart preprocessing improves data stream mining, 49th Hawaii International Conference on System Sciences (HICSS), pp.1749-1757, 2016. ,
A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection, IEEE Communications Surveys Tutorials, issue.99, pp.1-26, 2015. ,
Distance and Similarity Measures Effect on the Performance of K-Nearest Neighbor Classifier -{A} Review, CoRR, 2017. ,
Solving large scale linear prediction problems using stochastic gradient descent algorithms, Proceedings of the twenty-first international conference on Machine learning, p.116, 2004. ,
SMOTE: synthetic minority over-sampling technique, Journal of artificial intelligence research, vol.16, pp.321-357, 2002. ,
Online feature selection using grafting, Proceedings of the 20th International Conference on Machine Learning (ICML-03), pp.592-599, 2003. ,
Streamwise feature selection, Journal of Machine Learning Research, vol.7, pp.1861-1885, 2006. ,
Online feature selection with streaming features, IEEE transactions on pattern analysis and machine intelligence, vol.35, pp.1178-1192, 2013. ,