M. Newman, Networks: an introduction, 2010.
DOI : 10.1093/acprof:oso/9780199206650.001.0001

Y. Huang, C. Kintala, N. Kolettis, and N. D. Fulton, Software rejuvenation: analysis, module and applications, Twenty-Fifth International Symposium on Fault-Tolerant Computing. Digest of Papers, pp.381-390, 1995.
DOI : 10.1109/FTCS.1995.466961

A. Avritzer, R. G. Cole, and E. J. Weyuker, Using performance signatures and software rejuvenation for worm mitigation in tactical MANETs, Proceedings of the 6th international workshop on Software and performance , WOSP '07, pp.172-180, 2007.
DOI : 10.1145/1216993.1217023

A. Avritzer, R. Tanikella, K. James, R. G. Cole, and E. Weyuker, Monitoring for security intrusion using performance signatures, Proceedings of the first joint WOSP/SIPEW international conference on Performance engineering, WOSP/SIPEW '10, pp.93-104, 2010.
DOI : 10.1145/1712605.1712623

P. Van-mieghem, J. Omic, and R. Kooij, Virus Spread in Networks, IEEE/ACM Transactions on Networking, vol.17, issue.1, pp.1-14, 2009.
DOI : 10.1109/TNET.2008.925623

Y. Hayel, S. Trajanovski, E. Altman, H. Wang, and P. Van-mieghem, Complete game-theoretic characterization of SIS epidemics protection strategies, 53rd IEEE Conference on Decision and Control, 2014.
DOI : 10.1109/CDC.2014.7039541

URL : https://hal.archives-ouvertes.fr/hal-01054710

Y. Wang, D. Chakrabarti, C. Wang, and C. Faloutsos, Epidemic spreading in real networks: an eigenvalue viewpoint, 22nd International Symposium on Reliable Distributed Systems, 2003. Proceedings., pp.25-34, 2003.
DOI : 10.1109/RELDIS.2003.1238052

P. Netrapalli and S. Sanghavi, Learning the graph of epidemic cascades, ACM SIGMETRICS Performance Evaluation Review, pp.211-222, 2012.

J. Alonso, A. Bovenzi, J. Li, Y. Wang, S. Russo et al., Software rejuvenation: Do IT and telco industries use it? " in ISSREW, pp.299-304, 2012.

A. Avritzer, R. G. Cole, and E. J. Weyuker, Methods and opportunities for rejuvenation in aging distributed software systems, Journal of Systems and Software, vol.83, issue.9, pp.1568-1578, 2010.
DOI : 10.1016/j.jss.2010.05.026

A. Bovenzi, F. Brancati, S. Russo, and A. Bondavalli, An oslevel framework for anomaly detection in complex software systems, Trans. Dependable and Secure Computing, 2014.

S. Garg, A. Puliafito, M. Telek, and K. S. Trivedi, Analysis of software rejuvenation using Markov Regenerative Stochastic Petri Net, Proceedings of Sixth International Symposium on Software Reliability Engineering. ISSRE'95, pp.180-187, 1995.
DOI : 10.1109/ISSRE.1995.497656

A. Avritzer and E. J. Weyuker, Monitoring smoothly degrading systems for increased dependability, Empirical Software Engineering, vol.2, issue.1, pp.59-77, 1997.
DOI : 10.1023/A:1009794200077

A. Ganesh, L. Massoulié, and D. Towsley, The effect of network topology on the spread of epidemics, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies., pp.1455-1466, 2005.
DOI : 10.1109/INFCOM.2005.1498374

S. Méléard and D. Villemonais, Quasi-stationary distributions and population processes, Probability Surveys, vol.9, issue.0, pp.340-410, 2012.
DOI : 10.1214/11-PS191

V. Auletta, D. Ferraioli, F. Pasquale, and G. Persiano, Metastability of Logit Dynamics for Coordination Games, SODA. SIAM, 2012, pp.1006-1024
DOI : 10.1137/1.9781611973099.80

C. Asavathiratham, The influence model, IEEE Control Systems Magazine, vol.21, issue.6, 2000.
DOI : 10.1109/37.969135

M. Garetto, W. Gong, and D. Towsley, Modeling malware spreading dynamics, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), pp.1869-1879, 2003.
DOI : 10.1109/INFCOM.2003.1209209

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=