R. Bejtlich, The Tao of Network Security Monitoring: Beyond Intrusion Detection. Pearson Education Available: https, 2004.

M. Roesch, Snort: Lightweight intrusion detection for networks, Proc. LISA '99, pp.229-238, 1999.

. Amazon, Making Cloud SLAs readily usable in the EU private sector Available: https, 2016.

D. Riquet, G. Grimaud, and M. Hauspie, Discus: A massively distributed IDS architecture using a DSL-based configuration, 2014 International Conference on Information Science, Electronics and Electrical Engineering, 2014.
DOI : 10.1109/InfoSEEE.2014.6947859

URL : https://hal.archives-ouvertes.fr/hal-00996876

K. T. Kearney, F. Torelli, and C. Kotsokalis, SLA★: An abstract syntax for Service Level Agreements, 2010 11th IEEE/ACM International Conference on Grid Computing, 2010.
DOI : 10.1109/GRID.2010.5697973

V. Casola, A. De-benedictis, M. Rak, J. Modic, and M. Erascu, Automatically Enforcing Security SLAs in the Cloud, IEEE Transactions on Services Computing, 2016.
DOI : 10.1109/TSC.2016.2540630

A. Teshome, L. Rilling, and C. Morin, Including Security Monitoring in Cloud Service Level Agreements Available: https, Symposium on Reliable Distributed Systems (SRDS), PhD forum, 2016.

J. C. Hancock and P. A. Wintz, Signal detection theory, 1966.

S. Axelsson, The base-rate fallacy and its implications for the difficulty of intrusion detection, Proceedings of the 6th ACM conference on Computer and communications security , CCS '99, 1999.
DOI : 10.1145/319709.319710

R. A. Matthews, Base-rate errors and rain forecasts, Nature, vol.382, issue.6594, p.766, 1996.
DOI : 10.1038/382766a0

G. Gu, P. Fogla, D. Dagon, W. Lee, B. Skori? et al., Measuring intrusion detection capability, Proceedings of the 2006 ACM Symposium on Information, computer and communications security , ASIACCS '06, 2006.
DOI : 10.1145/1128817.1128834

F. Massicotte, F. Gagnon, Y. Labiche, L. Briand, and M. Couture, Automatic Evaluation of Intrusion Detection Systems, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 2006.
DOI : 10.1109/ACSAC.2006.15

A. Andrieux, K. Czajkowski, A. Dan, K. Keahey, H. Ludwig et al., Web services agreement specification (ws-agreement), Open Grid Forum, p.216, 2007.

A. De-benedictis, M. Rak, M. Turtur, and U. Villano, REST-Based SLA Management for Cloud Applications, 2015 IEEE 24th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp.93-98, 2015.
DOI : 10.1109/WETICE.2015.36

K. Saravanan and M. Rajaram, An exploratory study of cloud service level agreements-state of the art review, KSII TIIS, vol.9, issue.3, 2015.

D. Balouek, A. Carpen-amarie, G. Charrier, F. Desprez, E. Jeannot et al., Adding Virtualization Capabilities to the Grid???5000 Testbed, Cloud Computing and Services Science, ser. Communications in Computer and Information Science, pp.3-20, 2013.
DOI : 10.1007/978-3-319-04519-1_1

URL : https://hal.archives-ouvertes.fr/hal-00946971

Y. Xu, M. Bailey, F. Jahanian, K. Joshi, M. Hiltunen et al., An exploration of L2 cache covert channels in virtualized environments, Proceedings of the 3rd ACM workshop on Cloud computing security workshop, CCSW '11, pp.29-40, 2011.
DOI : 10.1145/2046660.2046670

T. H. Ptacek and T. N. Newsham, Insertion, evasion, and denial of service: Eluding network intrusion detection, DTIC Document, 1998.

C. C. Center, Tcp syn flooding and ip spoofing attacks CERT Advisory CA-1996-21, pp.1996-2021, 1996.