Worldwide Infrastructure Security Report, Arbor Networks Inc, 2014. ,
Enabling Distributed Security in Cyberspace. https://www.dhs. gov/xlibrary/assets/nppd-cyber-ecosystem-white-paper-03-23-2011, 2011. ,
DDoS Open Threat Signaling (DOTS) Working Group Operational Requirements, 2015. ,
Executive Order ? Improving Critical Infrastructure Cybersecurity . https://www.whitehouse.gov/the-press-office, 2013. ,
The Incident Object Description Exchange Format RFC, 2007. ,
DOI : 10.17487/rfc5070
URL : http://ietfreport.isoc.org/rfc/std/PDF/rfc5070.pdf
The Intrusion Detection Message Exchange Format (IDMEF) RFC 4765 (Experimental), 2007. ,
DOI : 10.17487/rfc4765
An Extensible Format for Email Feedback Reports RFC 5965, 2010. ,
DOI : 10.17487/rfc5965
URL : http://www.hakusan.tsg.ne.jp/~tjkawa/www.ietf.org/rfc/pdf/rfc5965.txt.pdf
Exchanging Security Events of flow-based Intrusion Detection Systems at Internet Scale, Internet Architecture Board and the Internet Society, 2015. ,
How to exchange security events? Overview and evaluation of formats and protocols, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), 2015. ,
DOI : 10.1109/INM.2015.7140300
A distributed trust model, Proceedings of the 1997 workshop on New security paradigms , NSPW '97, pp.48-60, 1997. ,
DOI : 10.1145/283699.283739
A probabilistic trust model for gnupg, 23C3, 23rd Chaos Communication Congress, pp.61-66, 2006. ,
Towards multi-layered intrusion detection in high-speed networks, 2014 6th International Conference On Cyber Conflict (CyCon 2014), p.2014, 2014. ,
DOI : 10.1109/CYCON.2014.6916403
On Security in Publish/Subscribe Services: A Survey, IEEE Communications Surveys & Tutorials, vol.17, issue.2, pp.966-997, 2015. ,
DOI : 10.1109/COMST.2014.2364616
A specification of the Agent Reputation and Trust (ART) testbed, Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems , AAMAS '05, pp.512-518, 2005. ,
DOI : 10.1145/1082473.1082551
URL : https://hal.archives-ouvertes.fr/hal-00405547
Trust Management Tools for Internet Applications, 2003. ,
DOI : 10.1007/3-540-44875-6_7
URL : http://www.doc.ic.ac.uk/~tgrand/iTrust.pdf
Charter and Saga -Unifying the global response to cybercrime though data exchange, research and public awareness, 2015. ,
Malware and Mobile Anti-Abuse Working Group: Member application, 2015. ,
Engineering human trust in mobile system collaborations, Proceedings of the 12th ACM SIGSOFT Twelfth International Symposium on Foundations of Software Engineering. SIGSOFT '04/FSE-12, pp.107-116, 2004. ,
DOI : 10.1145/1029894.1029912
Collaborative DDoS defense using flow-based security event information, NOMS 2016, 2016 IEEE/IFIP Network Operations and Management Symposium, 2016. ,
DOI : 10.1109/NOMS.2016.7502852
Collaborative attack mitigation and response: A survey, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), 2015. ,
DOI : 10.1109/INM.2015.7140407