Automated Information Flow Analysis of Virtualized Infrastructures, Proceedings of the 16th European Conference on Research in Computer Security, pp.392-415, 2011. ,
DOI : 10.1145/1189256.1189259
Cloud radar, Proceedings of the 30th Annual Computer Security Applications Conference on, ACSAC '14, 2014. ,
DOI : 10.1137/0201010
Topology Discovery in Heterogeneous IP Networks: The NetInventory System, IEEE/ACM Transactions on Networking, vol.12, issue.3, pp.401-414, 2004. ,
DOI : 10.1109/TNET.2004.828963
Improved Algorithms for Network Topology Discovery, International Workshop on Passive and Active Network Measurement, pp.149-162, 2005. ,
DOI : 10.1007/978-3-540-31966-5_12
URL : https://hal.archives-ouvertes.fr/hal-01487808
Efficient algorithms for large-scale topology discovery, ACM SIGMETRICS Performance Evaluation Review, vol.33, issue.1, pp.327-338, 2005. ,
DOI : 10.1145/1071690.1064256
URL : https://hal.archives-ouvertes.fr/hal-01491665
Network Discovery from Passive Measurements, Proceedings of the ACM SIGCOMM 2008 Conference on Data Communication, SIGCOMM '08, pp.291-302, 2008. ,
DOI : 10.1145/1402946.1402992
URL : http://www.cs.wisc.edu/~pb/sigcom08_final.pdf
Packet-level traffic measurements from the sprint IP backbone, IEEE Network, vol.17, issue.6, pp.6-16, 2003. ,
DOI : 10.1109/MNET.2003.1248656
URL : http://www.cs.ucsb.edu/~almeroth/classes/F05.276/papers/sprint.pdf
Providing active measurements as a regular service for isps, PAM, 2001. ,
An Empirical Comparison of Graph Databases, 2013 International Conference on Social Computing, pp.708-715, 2013. ,
DOI : 10.1109/SocialCom.2013.106
An annotated review of past papers on attack graphs, 2005. ,
DOI : 10.21236/ADA431826
Topology Discovery for Large Ethernet Networks, Proceedings of the, 2001. ,
DOI : 10.1145/383059.383078
URL : http://www.cs.wm.edu/~lowekamp/papers/lowekamp-topology-sigcomm01.ps
Auditing security Compliance of the Virtualized Infrastructure in the Cloud: Application to OpenStack, 6th ACM Conference on Data and Application Security and Privacy ACM CO- DASPY 2016, 2016. ,
Skitter: Caida's macroscopic internet topology discovery and tracking tool Measuring security risk of networks using attack graphs, International Journal of Next-Generation Computing, vol.17, issue.11, 1999. ,
Quantitative Security Risk Assessment of Enterprise Networks, 2012. ,
DOI : 10.1007/978-1-4614-1860-3
Automated service discovery for enterprise network management, 2009. ,