1 |
Mike Schiffman et Cisco CIAG, ≪Guide complet du CVSS v1≫, 2005.
|
2 |
Wikistat, ≪Analyse factorielle multiple des correspondances (AFCM)≫. 2016.Disponible sur: https://www.math.univtoulouse.fr/~besse/Wikistat/pdf/st-m-explo-afcm.pdf
|
3 |
G.Schaffrath et al, ≪An Overview of IP Flow-Based Intrusion Detection Communications Surveys & Tutorials≫, IEEE, 2010.
|
4 |
K. Kumar et al, ≪≪Identifying Network Anomalies Using Clustering Technique in Weblog Data,≫, International Journal of Computers & Technology, , vol. 2 , n° %13, juin 2012.
|
5 |
Peter Mell, Karen Scarfone, et Carnegie Mellon, ≪A Complete Guide to the Common Vulnerability Scoring System Version 2.0≫, 2007. https://www.first.org/cvss/v2/guide
|
6 |
Zhengjie Li et al, ≪Anomaly Intrusion Detection Method Based on K-means Clustering Algorithm with Particle Swarm Optimization,≫, International Conference of Information Technology, Computer Engineering and Management Sciences, 2011.
|
7 |
C. Gupta, A. Sinhal, et R. Kamble, ≪Intrusion Detection based on K-Means Clustering and Ant Colony Optimization: A Survey≫, IJCA, vol. 79, n° 6, p. 30-35, oct. 2013, doi: 10.5120/13747-1555.
DOI
|