J. H. Lala and F. B. Schneider, IT Monoculture Security Risks and Defenses, IEEE Security & Privacy Magazine, vol.7, issue.1, pp.12-13, 2009.
DOI : 10.1109/MSP.2009.11

M. Stamp, Risks of monoculture, Communications of the ACM, vol.47, issue.3, p.120, 2004.
DOI : 10.1145/971617.971650

Y. Zhang, H. Vin, L. Alvisi, W. Lee, and S. K. Dao, Heterogeneous networking, Proceedings of the 2001 workshop on New security paradigms , NSPW '01, pp.33-39, 2001.
DOI : 10.1145/508171.508177

Y. Yang, S. Zhu, and G. Cao, Improving sensor network immunity under worm attacks, Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing , MobiHoc '08, pp.149-158, 2008.
DOI : 10.1145/1374618.1374640

O. Donnell, A. J. Sethu, and H. , On achieving software diversity for improved network security using distributed coloring algorithms, Proceedings of the 11th ACM conference on Computer and communications security, pp.121-131, 2004.

J. Han, D. Gao, and R. Deng, On the effectiveness of software diversity: A systematic study on real-world vulnerabilities. Detection of Intrusions and Malware, and Vulnerability Assessment, pp.127-146, 2009.

K. Z. Snow, F. Monrose, L. Davi, A. Dmitrienko, C. Liebchen et al., Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization, 2013 IEEE Symposium on Security and Privacy, pp.574-588, 2013.
DOI : 10.1109/SP.2013.45

C. Giuffrida, A. Kuijsten, and A. S. Tanenbaum, Enhanced operating system security through efficient and fine-grained address space randomization, USENIX Security Symposium, 2012.

L. V. Davi, A. Dmitrienko, S. Nürnberger, and A. R. Sadeghi, Gadge me if you can, Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, ASIA CCS '13, pp.299-310, 2013.
DOI : 10.1145/2484313.2484351

P. Philippaerts, Y. Younan, S. Muylle, F. Piessens, S. Lachmund et al., Code Pointer Masking: Hardening Applications against Code Injection Attacks, Detection of Intrusions and Malware, and Vulnerability Assessment, pp.194-213, 2011.
DOI : 10.1109/ICDSC.2001.918971

J. H. Jafarian, E. Al-shaer, and Q. Duan, Openflow random host mutation, Proceedings of the first workshop on Hot topics in software defined networks, HotSDN '12, pp.127-132, 2012.
DOI : 10.1145/2342441.2342467

B. Salamat, T. Jackson, A. Gal, and M. Franz, Orchestra, Proceedings of the fourth ACM european conference on Computer systems, EuroSys '09, pp.33-46, 2009.
DOI : 10.1145/1519065.1519071

T. R. Jensen and B. Toft, Graph coloring problems, 2011.
DOI : 10.1002/9781118032497

R. Y. Chang, Z. Tao, J. Zhang, and C. C. Kuo, A Graph Approach to Dynamic Fractional Frequency Reuse (FFR) in Multi-Cell OFDMA Networks, 2009 IEEE International Conference on Communications, pp.1-6, 2009.
DOI : 10.1109/ICC.2009.5198612

M. Voigt, List colourings of planar graphs, Discrete Mathematics, vol.120, issue.1-3, pp.215-219, 1993.
DOI : 10.1016/0012-365X(93)90579-I

M. Hujter and Z. Tuza, Precoloring extension. ii. graph classes related to bipartite graphs, Acta Mathematica Universitatis Comenianae, vol.62, issue.1, pp.1-11, 1993.

A. A. Bulatov, H-Coloring dichotomy revisited, Theoretical Computer Science, vol.349, issue.1, pp.31-39, 2005.
DOI : 10.1016/j.tcs.2005.09.028

Z. Tuza, Graph colorings with local constraints -- a survey, Discussiones Mathematicae Graph Theory, vol.17, issue.2, pp.161-228, 1997.
DOI : 10.7151/dmgt.1049

A. Borodin, I. Ivan, Y. Ye, and B. Zimny, On sum coloring and sum multi-coloring for restricted families of graphs, Theoretical Computer Science, vol.418, pp.1-13, 2012.
DOI : 10.1016/j.tcs.2011.11.010

D. J. Welsh and M. B. Powell, An upper bound for the chromatic number of a graph and its application to timetabling problems, The Computer Journal, vol.10, issue.1, pp.85-86, 1967.
DOI : 10.1093/comjnl/10.1.85

B. Bollobás, The chromatic number of random graphs, Combinatorica, vol.5, issue.1, pp.49-55, 1988.
DOI : 10.1007/BF02122551

L. Premo, LOCAL EXTINCTIONS, CONNECTEDNESS, AND CULTURAL EVOLUTION IN STRUCTURED POPULATIONS, Advances in Complex Systems, vol.15, issue.01n02, 2012.
DOI : 10.1142/S0219525911003268

T. Jackson, B. Salamat, A. Homescu, K. Manivannan, G. Wagner et al., Compiler-Generated Software Diversity, pp.77-98, 2011.
DOI : 10.1007/978-1-4614-0977-9_4