M. Bernaschi, E. Gabrielli, and L. V. Mancini, Remus: a security-enhanced operating system, ACM Transactions on Information and System Security, vol.5, issue.1, pp.36-61, 2002.
DOI : 10.1145/504909.504911

J. Briffaut, J. Rouzaud-cornabas, C. Toinard, and Y. Zemali, A new approach to enforce the security properties of a clustered high-interaction honeypot, 2009 International Conference on High Performance Computing & Simulation, pp.184-192, 2009.
DOI : 10.1109/HPCSIM.2009.5194832

URL : https://hal.archives-ouvertes.fr/hal-00454467

S. N. Chari and P. Cheng, BlueBoX, ACM Transactions on Information and System Security, vol.6, issue.2, pp.173-200, 2003.
DOI : 10.1145/762476.762477

J. Gagneur, R. Krause, T. Bouwmeester, and E. G. Casari, Modular decomposition of proteinprotein interaction networks, Genome Biology, vol.5, issue.8, p.57, 2004.
DOI : 10.1186/gb-2004-5-8-r57

J. A. Goguen and J. Meseguer, Security Policies and Security Models, 1982 IEEE Symposium on Security and Privacy, pp.11-20, 1982.
DOI : 10.1109/SP.1982.10014

M. Habib and C. Paul, A survey of the algorithmic aspects of modular decomposition, Computer Science Review, vol.4, issue.1, pp.41-59, 2010.
DOI : 10.1016/j.cosrev.2010.01.001

R. Mcconnell and . De-montgolfier, Linear-time modular decomposition of directed graphs, Discrete Applied Mathematics, vol.145, issue.2, pp.198-209, 2005.
DOI : 10.1016/j.dam.2004.02.017

URL : https://hal.archives-ouvertes.fr/hal-00159571

C. Papadopoulos and C. Voglis, Drawing graphs using modular decomposition, Journal of Graph Algorithms and Applications, vol.11, issue.2, pp.481-511, 2007.
DOI : 10.7155/jgaa.00155

G. Portokalidis, A. Slowinska, and E. H. Bos, Argos : an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation, Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems 2006, EuroSys '06, pp.15-27, 2006.