Networks: an introduction, 2010. ,
DOI : 10.1093/acprof:oso/9780199206650.001.0001
Software rejuvenation: analysis, module and applications, Twenty-Fifth International Symposium on Fault-Tolerant Computing. Digest of Papers, pp.381-390, 1995. ,
DOI : 10.1109/FTCS.1995.466961
Using performance signatures and software rejuvenation for worm mitigation in tactical MANETs, Proceedings of the 6th international workshop on Software and performance , WOSP '07, pp.172-180, 2007. ,
DOI : 10.1145/1216993.1217023
Monitoring for security intrusion using performance signatures, Proceedings of the first joint WOSP/SIPEW international conference on Performance engineering, WOSP/SIPEW '10, pp.93-104, 2010. ,
DOI : 10.1145/1712605.1712623
Virus Spread in Networks, IEEE/ACM Transactions on Networking, vol.17, issue.1, pp.1-14, 2009. ,
DOI : 10.1109/TNET.2008.925623
Complete game-theoretic characterization of SIS epidemics protection strategies, 53rd IEEE Conference on Decision and Control, 2014. ,
DOI : 10.1109/CDC.2014.7039541
URL : https://hal.archives-ouvertes.fr/hal-01054710
Epidemic spreading in real networks: an eigenvalue viewpoint, 22nd International Symposium on Reliable Distributed Systems, 2003. Proceedings., pp.25-34, 2003. ,
DOI : 10.1109/RELDIS.2003.1238052
Learning the graph of epidemic cascades, ACM SIGMETRICS Performance Evaluation Review, pp.211-222, 2012. ,
Software rejuvenation: Do IT and telco industries use it? " in ISSREW, pp.299-304, 2012. ,
Methods and opportunities for rejuvenation in aging distributed software systems, Journal of Systems and Software, vol.83, issue.9, pp.1568-1578, 2010. ,
DOI : 10.1016/j.jss.2010.05.026
An oslevel framework for anomaly detection in complex software systems, Trans. Dependable and Secure Computing, 2014. ,
Analysis of software rejuvenation using Markov Regenerative Stochastic Petri Net, Proceedings of Sixth International Symposium on Software Reliability Engineering. ISSRE'95, pp.180-187, 1995. ,
DOI : 10.1109/ISSRE.1995.497656
Monitoring smoothly degrading systems for increased dependability, Empirical Software Engineering, vol.2, issue.1, pp.59-77, 1997. ,
DOI : 10.1023/A:1009794200077
The effect of network topology on the spread of epidemics, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies., pp.1455-1466, 2005. ,
DOI : 10.1109/INFCOM.2005.1498374
Quasi-stationary distributions and population processes, Probability Surveys, vol.9, issue.0, pp.340-410, 2012. ,
DOI : 10.1214/11-PS191
Metastability of Logit Dynamics for Coordination Games, SODA. SIAM, 2012, pp.1006-1024 ,
DOI : 10.1137/1.9781611973099.80
The influence model, IEEE Control Systems Magazine, vol.21, issue.6, 2000. ,
DOI : 10.1109/37.969135
Modeling malware spreading dynamics, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), pp.1869-1879, 2003. ,
DOI : 10.1109/INFCOM.2003.1209209
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.4753