E. Aleskerov, B. Freisleben, and B. Rao, CARDWATCH: a neural network based database mining system for credit card fraud detection, Proceedings of the IEEE/IAFE 1997 Computational Intelligence for Financial Engineering (CIFEr), pp.220-226, 1997.
DOI : 10.1109/CIFER.1997.618940

A. Avizienis, J. Laprie, B. Randell, and C. Landwehr, Basic concepts and taxonomy of dependable and secure computing. Dependable and Secure Computing, IEEE Transactions on, vol.1, issue.1, pp.11-33, 2004.

D. E. Denning, An intrusion-detection model. Software Engineering, IEEE Transactions, issue.2, pp.13222-232, 1987.

C. Erdman and J. W. Emerson, Package for Performing a Bayesian Analysis of Change Point Problems, Journal of Statistical Software, vol.23, issue.3, pp.1-13, 2007.
DOI : 10.18637/jss.v023.i03

L. Heberlein, Network security monitor (nsm)?final report, 1995.

W. Lee, S. J. Stolfo, and K. W. Mok, A data mining framework for building intrusion detection models, Security and Privacy Proceedings of the 1999 IEEE Symposium on, pp.120-132, 1999.

W. Lee and D. Xiang, Information-theoretic measures for anomaly detection, Security and Privacy, 2001. S P 2001. Proceedings . 2001 IEEE Symposium on, pp.130-143, 2001.

F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion et al., Scikit-learn: Machine learning in Python, Journal of Machine Learning Research, vol.12, pp.2825-2830, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00650905

C. Sauvanaud, K. Lazri, M. Kaâniche, and K. Kanoun, Anomaly Detection and Root Cause Localization in Virtual Network Functions, 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE)
DOI : 10.1109/ISSRE.2016.32

URL : https://hal.archives-ouvertes.fr/hal-01419014

C. Sauvanaud, G. Silvestre, M. Kaâniche, and K. Kanoun, Data Stream Clustering for Online Anomaly Detection in Cloud Applications, 2015 11th European Dependable Computing Conference (EDCC), 2015.
DOI : 10.1109/EDCC.2015.22

URL : https://hal.archives-ouvertes.fr/hal-01211774

J. Zhang, M. Zulkernine, and A. Haque, Random-Forests-Based Network Intrusion Detection Systems, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), vol.38, issue.5, pp.649-659, 2008.
DOI : 10.1109/TSMCC.2008.923876

D. Objectives and C. , 14 5.2 Monitoring, p.16

A. Feature-selection, 17 5.3.2 The joint approach

-. Per, 21 6.1.3 Principal Component Analysis with Joint Approach . 22 6.1.4 Principal Component Analysis with the per-VM approach, p.24