D. Anstee, D. Bussiere, G. Sockrider, and C. Morales, Worldwide Infrastructure Security Report, Arbor Networks Inc, 2014.

P. Reitinger, Enabling Distributed Security in Cyberspace. https://www.dhs. gov/xlibrary/assets/nppd-cyber-ecosystem-white-paper-03-23-2011, 2011.

C. Morrow and R. Dobbins, DDoS Open Threat Signaling (DOTS) Working Group Operational Requirements, 2015.

. The-white-house, Executive Order ? Improving Critical Infrastructure Cybersecurity . https://www.whitehouse.gov/the-press-office, 2013.

R. Danyliw, J. Meijer, and Y. Demchenko, The Incident Object Description Exchange Format RFC, 2007.
DOI : 10.17487/rfc5070

URL : http://ietfreport.isoc.org/rfc/std/PDF/rfc5070.pdf

H. Debar, D. Curry, and B. Feinstein, The Intrusion Detection Message Exchange Format (IDMEF) RFC 4765 (Experimental), 2007.
DOI : 10.17487/rfc4765

Y. Shafranovich, J. Levine, and M. Kucherawy, An Extensible Format for Email Feedback Reports RFC 5965, 2010.
DOI : 10.17487/rfc5965

URL : http://www.hakusan.tsg.ne.jp/~tjkawa/www.ietf.org/rfc/pdf/rfc5965.txt.pdf

J. Steinberger, A. Sperotto, H. Baier, and A. Pras, Exchanging Security Events of flow-based Intrusion Detection Systems at Internet Scale, Internet Architecture Board and the Internet Society, 2015.

J. Steinberger, A. Sperotto, M. Golling, and H. Baier, How to exchange security events? Overview and evaluation of formats and protocols, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), 2015.
DOI : 10.1109/INM.2015.7140300

A. Abdul-rahman and S. Hailes, A distributed trust model, Proceedings of the 1997 workshop on New security paradigms , NSPW '97, pp.48-60, 1997.
DOI : 10.1145/283699.283739

J. Jonczy, M. Wüthrich, and R. Haenni, A probabilistic trust model for gnupg, 23C3, 23rd Chaos Communication Congress, pp.61-66, 2006.

M. Golling, R. Hofstede, and R. Koch, Towards multi-layered intrusion detection in high-speed networks, 2014 6th International Conference On Cyber Conflict (CyCon 2014), p.2014, 2014.
DOI : 10.1109/CYCON.2014.6916403

C. Esposito and M. Ciampi, On Security in Publish/Subscribe Services: A Survey, IEEE Communications Surveys & Tutorials, vol.17, issue.2, pp.966-997, 2015.
DOI : 10.1109/COMST.2014.2364616

K. K. Fullam, T. B. Klos, G. Muller, J. Sabater, A. Schlosser et al., A specification of the Agent Reputation and Trust (ART) testbed, Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems , AAMAS '05, pp.512-518, 2005.
DOI : 10.1145/1082473.1082551

URL : https://hal.archives-ouvertes.fr/hal-00405547

T. Grandison, Trust Management Tools for Internet Applications, 2003.
DOI : 10.1007/3-540-44875-6_7

URL : http://www.doc.ic.ac.uk/~tgrand/iTrust.pdf

A. Group, Charter and Saga -Unifying the global response to cybercrime though data exchange, research and public awareness, 2015.

. Messaging, Malware and Mobile Anti-Abuse Working Group: Member application, 2015.

L. Capra, Engineering human trust in mobile system collaborations, Proceedings of the 12th ACM SIGSOFT Twelfth International Symposium on Foundations of Software Engineering. SIGSOFT '04/FSE-12, pp.107-116, 2004.
DOI : 10.1145/1029894.1029912

J. Steinberger, B. Kuhnert, A. Sperotto, H. Baier, and A. Pras, Collaborative DDoS defense using flow-based security event information, NOMS 2016, 2016 IEEE/IFIP Network Operations and Management Symposium, 2016.
DOI : 10.1109/NOMS.2016.7502852

J. Steinberger, A. Sperotto, H. Baier, and A. Pras, Collaborative attack mitigation and response: A survey, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), 2015.
DOI : 10.1109/INM.2015.7140407