Quality assessment of classification and cluster maps without ground truth knowledge, IEEE Transactions on Geoscience and Remote Sensing, vol.43, issue.4, pp.857-873, 2005. ,
DOI : 10.1109/TGRS.2004.843074
On the mean accuracy of statistical pattern recognizers, IEEE Transactions on Information Theory, vol.14, issue.1, pp.55-63, 1968. ,
DOI : 10.1109/TIT.1968.1054102
A Novel Transductive SVM for Semisupervised Classification of Remote-Sensing Images, Geoscience and Remote Sensing, p.3363, 2006. ,
DOI : 10.1109/TGRS.2006.877950
A Semilabeled-Sample-Driven Bagging Technique for Ill-Posed Classification Problems, IEEE Geoscience and Remote Sensing Letters, vol.2, issue.1, pp.69-73, 2005. ,
DOI : 10.1109/LGRS.2004.841478
The 1999 DARPA off-line intrusion detection evaluation, Computer Networks, vol.34, issue.4, pp.579-595, 2000. ,
DOI : 10.1016/S1389-1286(00)00139-0
Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory, ACM Transactions on Information and System Security, vol.3, issue.4, pp.262-294, 2000. ,
DOI : 10.1145/382912.382923
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection, 2010 IEEE Symposium on Security and Privacy, pp.305-321, 2010. ,
DOI : 10.1109/SP.2010.25
An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection, Proc. Recent Advances in Intrusion Detection, 2003. ,
DOI : 10.1007/978-3-540-45248-5_13
Anomaly detection of web-based attacks, Proceedings of the 10th ACM conference on Computer and communication security , CCS '03, p.251261, 2003. ,
DOI : 10.1145/948109.948144
Network intrusion detection using random forests, Proceedings of the the Third Annual Conference on Privacy, Security and Trust, pp.53-61, 2005. ,
Comparative Study of Supervised Machine Learning Techniques for Intrusion Detection Communication Networks and Services Research, CNSR '07. Fifth Annual Conference on, pp.350-364, 2007. ,
Improved detection of low-profile probe and denial-of-service attacks, Proceedings of the 2001 Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection, 2001. ,
Extreme learning machines for intrusion detection, The 2012 International Joint Conference on Neural Networks (IJCNN), pp.10-15, 2012. ,
DOI : 10.1109/IJCNN.2012.6252449
Principes et pratiques, 2006. ,
An Evaluation of Naive Bayesian Anti-Spam Filtering, Proceedings of the Workshop on Machine Learning in the New Information Age, 11th European Conference on Machine Learning, p.917, 2000. ,
Bro: a system for detecting network intruders in real-time, Computer Networks, vol.31, issue.23-24, pp.23-24, 1999. ,
DOI : 10.1016/S1389-1286(99)00112-7
Youtube traffic characterization, Proceedings of the 7th ACM SIGCOMM conference on Internet measurement , IMC '07, 2008. ,
DOI : 10.1145/1298306.1298310
Improving Web Application Firewalls to detect advanced SQL injection attacks, 2014 10th International Conference on Information Assurance and Security, pp.35-63, 2014. ,
DOI : 10.1109/ISIAS.2014.7064617
URL : https://hal.archives-ouvertes.fr/hal-01137542
Ensemble of machine learning algorithms for intrusion detection, SMC 2009. IEEE International Conference on, pp.3976-3987, 2009. ,