P. Barford, J. Kline, D. Plonka, and A. Ron, A signal analysis of network traffic anomalies, Proceedings of the second ACM SIGCOMM Workshop on Internet measurment , IMW '02, 2002.
DOI : 10.1145/637201.637210

M. Basseville, Distance measures for signal processing and pattern recognition, Signal Processing, vol.18, issue.4, pp.349-369, 1989.
DOI : 10.1016/0165-1684(89)90079-0

URL : https://hal.archives-ouvertes.fr/inria-00075657

P. Borgnat, Détection d'attaques de déni de service par un modèle non gaussien multirésolution, 2006.

B. Krishnamurty, S. Sen, Y. Zhang, and Y. Chen, Sketchbased change detection: Methods, evaluation, and applications, ACM IMC, 2003.

A. Lakhina, M. Crovella, and C. Diot, Diagnosing networkwide traffic anomalies, SIGCOMM, 2004.
DOI : 10.1145/1015467.1015492

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

L. Li and G. Lee, DDoS attack detection and wavelets, International Conference on computer communications and networks, 2003.
DOI : 10.1109/icccn.2003.1284203

X. Li, Detection and identification of network anomalies using sketch subspaces, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, 2006.
DOI : 10.1145/1177080.1177099

M. Dietzfelbinger, J. Gil, Y. Matias, and N. Pippenger, Polynomial hash functions are reliable, Proc. 19th ICALP, pp.235-246, 1992.
DOI : 10.1007/3-540-55719-9_77

S. Muthukrishnan, Data Streams: Algorithms and Applications, Foundations and Trends?? in Theoretical Computer Science, vol.1, issue.2, 2003.
DOI : 10.1561/0400000002

URL : http://ce.sharif.edu/courses/90-91/1/ce797-1/resources/root/Data_Streams_-_Algorithms_and_Applications.pdf

A. Scherrer, N. Larrieu, P. Owezarski, P. Borgnat, and P. Abry, Non gaussian and long memory statistical characterisations for internet traffic with anomalies, IEEE Trans. on Depend. and Secure Comp, 2006.
URL : https://hal.archives-ouvertes.fr/ensl-00175477

M. Thorup and Y. Zhang, Tabulation based 4-universal hashing with applications to second moment estimation, Proc. ACM-SIAM SODA, 2004.