S. Androutsellis-theotokis and D. Spinellis, A survey of peer-to-peer content distribution technologies, ACM Computing Surveys, vol.36, issue.4, pp.335-371, 2004.
DOI : 10.1145/1041680.1041681

F. Cuppens and R. Ortalo, LAMBDA: A language to model a database for detection of attacks. In: Recent advances in intrusion detection, pp.197-216, 2000.

Z. Czirkos and G. Hosszú, Peer-to-peer Based Intrusion Detection, Infocommunications Journal LXIV(I), pp.3-10, 2009.

Z. Czirkos, L. L. Tóth, G. Hosszú, and F. Kovács, Novel Applications of the Peerto-Peer Communication Methodology, Journal on Information Technologies and Communications E, vol.1, issue.15, pp.59-70, 2009.

H. Debar and A. Wespi, Aggregation and Correlation of Intrusion-Detection Alerts, Lecture Notes in Computer Science, vol.2212, pp.85-103, 2001.
DOI : 10.1007/3-540-45474-8_6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.104.6291

N. Duffield, P. Haffner, B. Krishnamurthy, and H. Ringberg, Rule-Based Anomaly Detection on IP Flows, IEEE INFOCOM 2009, The 28th Conference on Computer Communications, pp.424-432, 2009.
DOI : 10.1109/INFCOM.2009.5061947

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.145.1613

R. Janakiraman, M. Waldvogel, and Q. Zhang, Indra: a peer-to-peer approach to network intrusion detection and prevention, WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003., pp.226-231, 2003.
DOI : 10.1109/ENABL.2003.1231412

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.5242

D. Karger, E. Lehman, T. Leighton, R. Panigrahy, M. Levine et al., Consistent hashing and random trees, Proceedings of the twenty-ninth annual ACM symposium on Theory of computing , STOC '97, pp.654-663, 1997.
DOI : 10.1145/258533.258660

R. Kemmerer, Nstat: A model-based real-time network intrusion detection system, 1997.

R. Kemmerer and G. Vigna, Intrusion detection: a brief history and overview, Computer, vol.35, issue.4, pp.27-30, 2002.
DOI : 10.1109/MC.2002.1012428

S. Krishnamurthy, S. El-ansary, E. Aurell, and S. Haridi, A statistical theory of chord under churn. Peer-to-Peer Systems IV pp, pp.93-103, 2005.

P. Maymounkov and D. Mazières, Kademlia: A Peer-to-Peer Information System Based on the XOR Metric, 2002.
DOI : 10.1007/3-540-45748-8_5

D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford et al., Inside the slammer worm, IEEE Security & Privacy Magazine, vol.1, issue.4, pp.33-39, 2003.
DOI : 10.1109/MSECP.2003.1219056

I. Stoica, R. Morris, D. Karger, M. Kaashoek, and H. Balakrishnan, Chord, ACM SIGCOMM Computer Communication Review, vol.31, issue.4, pp.149-160, 2001.
DOI : 10.1145/964723.383071

S. Templeton and K. Levitt, A requires/provides model for computer attacks, Proceedings of the 2000 workshop on New security paradigms , NSPW '00, pp.31-38, 2001.
DOI : 10.1145/366173.366187

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.4374

A. Valdes and K. Skinner, Probabilistic Alert Correlation, Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection pp, pp.54-68, 2001.
DOI : 10.1007/3-540-45474-8_4

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.15.3371

V. Vlachos and D. Spinellis, A PRoactive malware identification system based on the computer hygiene principles, Information Management & Computer Security, vol.15, issue.4, pp.295-312, 2007.
DOI : 10.1145/948109.948136

V. Yegneswaran, P. Barford, and S. Jha, Global intrusion detection in the domino overlay system, Proceedings of NDSS, 2004.

C. V. Zhou, S. Karunasekera, and C. Leckie, A Peer-to-Peer Collaborative Intrusion Detection System, In: Networks, 2005. 13th IEEE International Conference on, p.6, 2006.

C. Zhou, C. Leckie, and S. Karunasekera, A survey of coordinated attacks and collaborative intrusion detection, Computers & Security, vol.29, issue.1, pp.124-140, 2010.
DOI : 10.1016/j.cose.2009.06.008