V. Jacobson, D. K. Smetters, J. D. Thornton, M. F. Plass, N. H. Briggs et al., Networking Named Content, ACM CoNEXT, 2009.

E. Whitepaper, Network Functions Virtualisation -An Introduction, Benefits, Enablers, Challenges & Call for Action, 2012.

W. Mallouli, B. Wehbi, E. Montes-de-oca, and M. Bourdelles, Online Network Traffic Security Inspection Using MMT Tool, the 9th workshop on system testing and validation (STV)

X. Ou, S. Govindavajhala, and A. W. Appel, Mulval: A logic-based network security analyzer, Proceedings of the 14th conference on USENIX Security Symposium, pp.8-8, 2005.

F. X. Aguessy, L. Gaspard, O. Bettan, and V. Conan, Remediation Logical Attack Paths Using Infromation System Simulated Topologies

S. Wang, J. Bi, J. Wu, X. Yang, and L. Fan, On adapting HTTP protocol to content centric networking, Proceedings of the 7th International Conference on Future Internet Technologies, CFI '12, pp.1-6, 2012.
DOI : 10.1145/2377310.2377312

P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris et al., Xen and the art of virtualization, Proceedings of the nineteenth ACM symposium on Operating Systems Principles (SOSP19), pp.164-177, 2003.

A. Fox and R. Griffith, Above the clouds: A Berkeley view of cloud computing, Dept. Electrical Eng. and Comput. Sciences, p.28, 2009.

A. Vitor-de-almeida-palhares, M. A. Santos, P. T. Endo, and J. Vitalino, Wuhib: Joint Allocation of Nodes and Links with Load Balancing in Network Virtualization, 2014.

M. Valdez-vivas, N. Bambos, and G. John, Apostolopoulos: Dynamic resource management in virtualized data centers with bursty traffic, the proceedings of ICC conference, pp.4287-4293, 2014.

D. Turull and M. Hidell, Peter Sjödin: Performance evaluation of openflow controllers for network virtualization, HPSR, vol.2014, pp.50-56

A. Hitoshi, L. Ruidong, and C. Nakjung, Container-Based Unified Testbed for Information-Centric Networking, IEEE Network Magazine, issue.6, 2014.

J. Martins, M. Ahmed, C. Raiciu, V. A. Olteanu, M. Honda et al., ClickOS and the Art of Network Function Virtualization, NSDI, vol.2014, pp.459-473

J. Menon, Y. Santos, G. Turner, and W. Janakiraman, Diagnosing performance overheads in the xen virtual machine environment, Proceedings of the 1st ACM/USENIX international conference on Virtual execution environments , VEE '05
DOI : 10.1145/1064979.1064984

A. Kivity, Y. Kamay, D. Laor, U. Lublin, and &. A. Liguori, KVM: the Linux Virtual Machine Monitor, Proc Linux Symposium, vol.17, 2007.

T. Garfinkel and . Rosenblum, A Virtual Machine Introspection Based Architecture for Intrusion Detection, Proc. NDSS, 2003.

A. S. Ibrahim, J. Hamlyn-harris, . Grundy, and M. John-;-almorsy, CloudSec: A security monitoring appliance for Virtual Machines in the IaaS cloud model, 2011 5th International Conference on Network and System Security, 2011.
DOI : 10.1109/ICNSS.2011.6059967

G. Dunlap, . St-king, M. Cinar, P. M. Basrai, and . Chen, ReVirt: enabling intrusion analysis through virtual-machine logging and replay, Proc. ACM SIGOPS Operating Systems Review -OSDI '02

W. Felter-alexandre-ferreira-ram-rajamony-juan-rubio, An Updated Performance Comparison of Virtual Machines and Linux Containers, 2014.