A. Baraldi, L. Bruzzone, and P. Blonda, Quality assessment of classification and cluster maps without ground truth knowledge, IEEE Transactions on Geoscience and Remote Sensing, vol.43, issue.4, pp.857-873, 2005.
DOI : 10.1109/TGRS.2004.843074

G. F. Hughes, On the mean accuracy of statistical pattern recognizers, IEEE Transactions on Information Theory, vol.14, issue.1, pp.55-63, 1968.
DOI : 10.1109/TIT.1968.1054102

L. Bruzzone and M. Marconcini, A Novel Transductive SVM for Semisupervised Classification of Remote-Sensing Images, Geoscience and Remote Sensing, p.3363, 2006.
DOI : 10.1109/TGRS.2006.877950

M. Chi and L. Bruzzone, A Semilabeled-Sample-Driven Bagging Technique for Ill-Posed Classification Problems, IEEE Geoscience and Remote Sensing Letters, vol.2, issue.1, pp.69-73, 2005.
DOI : 10.1109/LGRS.2004.841478

R. Lippmann, J. W. Haines, D. J. Fried, J. Korba, and K. Das, The 1999 DARPA off-line intrusion detection evaluation, Computer Networks, vol.34, issue.4, pp.579-595, 2000.
DOI : 10.1016/S1389-1286(00)00139-0

. Mchugh, Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory, ACM Transactions on Information and System Security, vol.3, issue.4, pp.262-294, 2000.
DOI : 10.1145/382912.382923

R. Sommer and V. Paxson, Outside the Closed World: On Using Machine Learning for Network Intrusion Detection, 2010 IEEE Symposium on Security and Privacy, pp.305-321, 2010.
DOI : 10.1109/SP.2010.25

M. V. Mahoney and P. K. Chan, An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection, Proc. Recent Advances in Intrusion Detection, 2003.
DOI : 10.1007/978-3-540-45248-5_13

C. Kruegel and G. Vigna, Anomaly detection of web-based attacks, Proceedings of the 10th ACM conference on Computer and communication security , CCS '03, p.251261, 2003.
DOI : 10.1145/948109.948144

J. Zhang and M. Zulkernine, Network intrusion detection using random forests, Proceedings of the the Third Annual Conference on Privacy, Security and Trust, pp.53-61, 2005.

F. Gharibian and A. A. Ghorbani, Comparative Study of Supervised Machine Learning Techniques for Intrusion Detection Communication Networks and Services Research, CNSR '07. Fifth Annual Conference on, pp.350-364, 2007.

W. W. Streilein, R. K. Cunningham, and S. E. Webster, Improved detection of low-profile probe and denial-of-service attacks, Proceedings of the 2001 Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection, 2001.

C. Cheng and ;. Huang, Extreme learning machines for intrusion detection, The 2012 International Joint Conference on Neural Networks (IJCNN), pp.10-15, 2012.
DOI : 10.1109/IJCNN.2012.6252449

C. P. Robert and L. Choix-baysien, Principes et pratiques, 2006.

I. Androutsopoulos, J. Koutsias, K. V. Chandrinos, G. Paliouras, and C. D. Spyropoulos, An Evaluation of Naive Bayesian Anti-Spam Filtering, Proceedings of the Workshop on Machine Learning in the New Information Age, 11th European Conference on Machine Learning, p.917, 2000.

V. Paxson, Bro: a system for detecting network intruders in real-time, Computer Networks, vol.31, issue.23-24, pp.23-24, 1999.
DOI : 10.1016/S1389-1286(99)00112-7

P. Gill, M. Arlitt, Z. Li, and A. Mahanti, Youtube traffic characterization, Proceedings of the 7th ACM SIGCOMM conference on Internet measurement , IMC '07, 2008.
DOI : 10.1145/1298306.1298310

A. Makiou, Y. Begriche, and A. Serhrouchni, Improving Web Application Firewalls to detect advanced SQL injection attacks, 2014 10th International Conference on Information Assurance and Security, pp.35-63, 2014.
DOI : 10.1109/ISIAS.2014.7064617

URL : https://hal.archives-ouvertes.fr/hal-01137542

. Te-shun, J. Chou-;-fan, S. Fan, and K. Makki, Ensemble of machine learning algorithms for intrusion detection, SMC 2009. IEEE International Conference on, pp.3976-3987, 2009.