S. Bleikertz, T. Groß, M. Schunter, and K. Eriksson, Automated Information Flow Analysis of Virtualized Infrastructures, Proceedings of the 16th European Conference on Research in Computer Security, pp.392-415, 2011.
DOI : 10.1145/1189256.1189259

S. Bleikertz, C. Vogel, and T. Gross, Cloud radar, Proceedings of the 30th Annual Computer Security Applications Conference on, ACSAC '14, 2014.
DOI : 10.1137/0201010

Y. Breitbart, M. Garofalakis, B. Jai, C. Martin, R. Rastogi et al., Topology Discovery in Heterogeneous IP Networks: The NetInventory System, IEEE/ACM Transactions on Networking, vol.12, issue.3, pp.401-414, 2004.
DOI : 10.1109/TNET.2004.828963

B. Donnet, T. Friedman, and M. Crovella, Improved Algorithms for Network Topology Discovery, International Workshop on Passive and Active Network Measurement, pp.149-162, 2005.
DOI : 10.1007/978-3-540-31966-5_12

URL : https://hal.archives-ouvertes.fr/hal-01487808

B. Donnet, P. Raoult, T. Friedman, and M. Crovella, Efficient algorithms for large-scale topology discovery, ACM SIGMETRICS Performance Evaluation Review, vol.33, issue.1, pp.327-338, 2005.
DOI : 10.1145/1071690.1064256

URL : https://hal.archives-ouvertes.fr/hal-01491665

B. Eriksson, P. Barford, and R. Nowak, Network Discovery from Passive Measurements, Proceedings of the ACM SIGCOMM 2008 Conference on Data Communication, SIGCOMM '08, pp.291-302, 2008.
DOI : 10.1145/1402946.1402992

URL : http://www.cs.wisc.edu/~pb/sigcom08_final.pdf

C. Fraleigh, S. Moon, B. Lyles, C. Cotton, M. Khan et al., Packet-level traffic measurements from the sprint IP backbone, IEEE Network, vol.17, issue.6, pp.6-16, 2003.
DOI : 10.1109/MNET.2003.1248656

URL : http://www.cs.ucsb.edu/~almeroth/classes/F05.276/papers/sprint.pdf

F. Georgatos, F. Gruber, D. Karrenberg, M. Santcroos, A. Susanj et al., Providing active measurements as a regular service for isps, PAM, 2001.

S. Jouili and V. Vansteenberghe, An Empirical Comparison of Graph Databases, 2013 International Conference on Social Computing, pp.708-715, 2013.
DOI : 10.1109/SocialCom.2013.106

R. Paul-lippmann, K. W. Ingols, M. Inst, . Tech, and . Lincoln, An annotated review of past papers on attack graphs, 2005.
DOI : 10.21236/ADA431826

B. Lowekamp, O. David, T. Hallaron, and . Gross, Topology Discovery for Large Ethernet Networks, Proceedings of the, 2001.
DOI : 10.1145/383059.383078

URL : http://www.cs.wm.edu/~lowekamp/papers/lowekamp-topology-sigcomm01.ps

T. Madi, S. Majumdar, Y. Wang, M. Pourzandi, and L. Wang, Auditing security Compliance of the Virtualized Infrastructure in the Cloud: Application to OpenStack, 6th ACM Conference on Data and Application Security and Privacy ACM CO- DASPY 2016, 2016.

D. Mcrobb, T. Claffy, S. Monk, S. Noel, A. Jajodia et al., Skitter: Caida's macroscopic internet topology discovery and tracking tool Measuring security risk of networks using attack graphs, International Journal of Next-Generation Computing, vol.17, issue.11, 1999.

X. Ou and A. Singhal, Quantitative Security Risk Assessment of Enterprise Networks, 2012.
DOI : 10.1007/978-1-4614-1860-3

W. Tu, P. Thangaraj, J. Chiang, and T. Chiueh, Automated service discovery for enterprise network management, 2009.