M. Aguilera, J. Mogul, . Wiener, A. Reynolds, and . Muthitacharoen, Performance debugging for distributed systems of black boxes, Proceedings of the nineteenth ACM symposium on Operating systems principles, pp.74-89, 2003.

P. Barham, . Black, . Goldszmidt, . Isaacs, . Maccormick et al., Constellation: automated discovery of service and host dependencies in networked systems, 2008.

S. Brin and L. Page, The anatomy of a large-scale hypertextual web search engine. Computer networks and ISDN systems, pp.107-117, 1998.

M. Chen, . Accardi, J. Kiciman, and . Lloyd, Path-based failure and evolution management, 2004.

X. Chen, . Zhang, P. Mao, and . Bahl, Automating network application dependency discovery: Experiences, limitations, and new solutions, Proceedings of OSDI, 2008.

W. Network and . Group, Rpc: Remote procedure call protocol specification version 2, 2010.

M. Iliofotou, . Pappu, . Faloutsos, . Mitzenmacher, G. Singh et al., Network monitoring using traffic dispersion graphs (tdgs), Proceedings of the 7th ACM SIGCOMM conference on Internet measurement , IMC '07, pp.315-320, 2007.
DOI : 10.1145/1298306.1298349

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

L. Jian-guang, F. Qiang, J. Yi, and W. , Mining dependency in distributed systems through unstructured logs analysis

S. Kandula, D. Chandra, and . Katabi, What's going on?: learning communication rules in edge networks, Proceedings of the ACM SIGCOMM 2008 conference on Data communication, pp.87-98, 2008.

J. Kannan, . Jung, and . Paxson, Semi-automated discovery of application session structure, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, pp.119-132, 2006.
DOI : 10.1145/1177080.1177096

J. Kleinberg, Authoritative sources in a hyperlinked environment, Journal of the ACM, vol.46, issue.5, 1999.
DOI : 10.1145/324133.324140

A. Ng, M. Zheng, and . Jordan, Link analysis, eigenvectors and stability, International Joint Conference on Artificial Intelligence, pp.903-910, 2001.

P. Reynolds, J. Wiener, . Mogul, A. Aguilera, and . Vahdat, WAP5, Proceedings of the 15th international conference on World Wide Web , WWW '06, pp.347-356, 2006.
DOI : 10.1145/1135777.1135830

R. Sawilla and X. Ou, Identifying critical attack assets in dependency attack gaphs, Proceedings of the 13th European Symposium on Research in Computer Security, pp.18-34, 2008.

S. Wang, . State, T. Ourdane, and . Engel, Mining NetFlow Records for Critical Network Activities, Proceedings of the 6th International Wireless Communications & Mobile Computing Conference, 2010.
DOI : 10.1007/978-3-642-13986-4_20

URL : https://hal.archives-ouvertes.fr/hal-01056635