CARDWATCH: a neural network based database mining system for credit card fraud detection, Proceedings of the IEEE/IAFE 1997 Computational Intelligence for Financial Engineering (CIFEr), pp.220-226, 1997. ,
DOI : 10.1109/CIFER.1997.618940
Basic concepts and taxonomy of dependable and secure computing. Dependable and Secure Computing, IEEE Transactions on, vol.1, issue.1, pp.11-33, 2004. ,
An intrusion-detection model. Software Engineering, IEEE Transactions, issue.2, pp.13222-232, 1987. ,
Package for Performing a Bayesian Analysis of Change Point Problems, Journal of Statistical Software, vol.23, issue.3, pp.1-13, 2007. ,
DOI : 10.18637/jss.v023.i03
Network security monitor (nsm)?final report, 1995. ,
A data mining framework for building intrusion detection models, Security and Privacy Proceedings of the 1999 IEEE Symposium on, pp.120-132, 1999. ,
Information-theoretic measures for anomaly detection, Security and Privacy, 2001. S P 2001. Proceedings . 2001 IEEE Symposium on, pp.130-143, 2001. ,
Scikit-learn: Machine learning in Python, Journal of Machine Learning Research, vol.12, pp.2825-2830, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00650905
Anomaly Detection and Root Cause Localization in Virtual Network Functions, 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE) ,
DOI : 10.1109/ISSRE.2016.32
URL : https://hal.archives-ouvertes.fr/hal-01419014
Data Stream Clustering for Online Anomaly Detection in Cloud Applications, 2015 11th European Dependable Computing Conference (EDCC), 2015. ,
DOI : 10.1109/EDCC.2015.22
URL : https://hal.archives-ouvertes.fr/hal-01211774
Random-Forests-Based Network Intrusion Detection Systems, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), vol.38, issue.5, pp.649-659, 2008. ,
DOI : 10.1109/TSMCC.2008.923876
14 5.2 Monitoring, p.16 ,
17 5.3.2 The joint approach ,
21 6.1.3 Principal Component Analysis with Joint Approach . 22 6.1.4 Principal Component Analysis with the per-VM approach, p.24 ,