Remus: a security-enhanced operating system, ACM Transactions on Information and System Security, vol.5, issue.1, pp.36-61, 2002. ,
DOI : 10.1145/504909.504911
A new approach to enforce the security properties of a clustered high-interaction honeypot, 2009 International Conference on High Performance Computing & Simulation, pp.184-192, 2009. ,
DOI : 10.1109/HPCSIM.2009.5194832
URL : https://hal.archives-ouvertes.fr/hal-00454467
BlueBoX, ACM Transactions on Information and System Security, vol.6, issue.2, pp.173-200, 2003. ,
DOI : 10.1145/762476.762477
Modular decomposition of proteinprotein interaction networks, Genome Biology, vol.5, issue.8, p.57, 2004. ,
DOI : 10.1186/gb-2004-5-8-r57
Security Policies and Security Models, 1982 IEEE Symposium on Security and Privacy, pp.11-20, 1982. ,
DOI : 10.1109/SP.1982.10014
A survey of the algorithmic aspects of modular decomposition, Computer Science Review, vol.4, issue.1, pp.41-59, 2010. ,
DOI : 10.1016/j.cosrev.2010.01.001
Linear-time modular decomposition of directed graphs, Discrete Applied Mathematics, vol.145, issue.2, pp.198-209, 2005. ,
DOI : 10.1016/j.dam.2004.02.017
URL : https://hal.archives-ouvertes.fr/hal-00159571
Drawing graphs using modular decomposition, Journal of Graph Algorithms and Applications, vol.11, issue.2, pp.481-511, 2007. ,
DOI : 10.7155/jgaa.00155
Argos : an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation, Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems 2006, EuroSys '06, pp.15-27, 2006. ,