B. Ahlgren, C. Dannewitz, C. Imbrenda, D. Kutscher, and B. Ohlman, A survey of information-centric networking, IEEE Communications Magazine, vol.50, issue.7, 2012.
DOI : 10.1109/MCOM.2012.6231276

L. Zhang, A. Afanasyev, J. Burke, V. Jacobson, P. Claffy et al., Named data networking, ACM SIGCOMM Computer Communication Review, vol.44, issue.3, pp.66-73, 2014.
DOI : 10.1145/2656877.2656887

URL : https://hal.archives-ouvertes.fr/hal-01182997

C. Yi, A. Afanasyev, I. Moiseenko, L. Wang, B. Zhang et al., A case for stateful forwarding plane, Computer Communications, vol.36, issue.7, pp.779-791, 2013.
DOI : 10.1016/j.comcom.2013.01.005

URL : http://named-data.net/techreport/TR002-forward.pdf

A. Afanasyev, P. Mahadevan, I. Moiseenko, E. Uzun, and L. Zhang, Interest flooding attack and countermeasures in named data networking, IFIP Networking Conference, pp.22-24, 2013.

M. Wählisch, T. C. Schmidt, and M. Vahlenkamp, Backscatter from the data plane ? threats to stability and security in Information-Centric Networking, 1205.

P. Gasti, G. Tsudik, E. Uzun, and L. Zhang, DoS and DDoS in nameddata networking, 1208.
DOI : 10.1109/icccn.2013.6614127

URL : http://arxiv.org/pdf/1208.0952.pdf

C. Ghali, G. Tsudik, E. Uzun, and C. A. Wood, Living in a pit-less world: A case against stateful forwarding in content-centric networking, 2015.

H. Salah, J. Wulfheide, and T. Strufe, Coordination supports security: A new defence mechanism against interest flooding in NDN, 2015 IEEE 40th Conference on Local Computer Networks (LCN), pp.73-81, 2015.
DOI : 10.1109/LCN.2015.7366285

A. Compagno, M. Conti, P. Gasti, and G. Tsudik, Poseidon: Mitigating interest flooding DDoS attacks in Named Data Networking, 38th Annual IEEE Conference on Local Computer Networks, pp.630-638, 2013.
DOI : 10.1109/LCN.2013.6761300

URL : http://arxiv.org/abs/1303.4823

P. Gasti, G. Tsudik, E. Uzun, and L. Zhang, DoS and DDoS in Named Data Networking, 2013 22nd International Conference on Computer Communication and Networks (ICCCN), pp.1-7, 2013.
DOI : 10.1109/ICCCN.2013.6614127

URL : http://arxiv.org/pdf/1208.0952.pdf

A. Compagno, M. Conti, P. Gasti, and G. Tsudik, NDN interest flooding attacks and countermeasures, Annual Computer Security Applications Conference, 2012.

H. Salah and T. Strufe, Evaluating and mitigating a Collusive version of the Interest Flooding Attack in NDN, 2016 IEEE Symposium on Computers and Communication (ISCC), pp.938-945, 2016.
DOI : 10.1109/ISCC.2016.7543857

X. Marchal, T. Cholez, and O. Festor, Server-side performance evaluation of NDN, Proceedings of the 2016 conference on 3rd ACM Conference on Information-Centric Networking, ACM-ICN '16, pp.148-153, 2016.
DOI : 10.1109/TNET.2013.2244230

URL : https://hal.archives-ouvertes.fr/hal-01386777

J. Tang, Z. Zhang, Y. Liu, and H. Zhang, Identifying Interest Flooding in Named Data Networking, 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, pp.306-310, 2013.
DOI : 10.1109/GreenCom-iThings-CPSCom.2013.68

K. Wang, H. Zhou, H. Luo, J. Guan, Y. Qin et al., Detecting and mitigating interest flooding attacks in content-centric network, Security and Communication Networks, vol.28, issue.1, pp.685-699, 2014.
DOI : 10.1145/1731060.1731063

K. Wang, H. Zhou, Y. Qin, J. Chen, and H. Zhang, Decoupling malicious interests from pending interest table to mitigate interest flooding attacks, Globecom Workshops (GC Wkshps), pp.963-968, 2013.

H. Dai, Y. Wang, J. Fan, and B. Liu, Mitigate DDoS attacks in NDN by interest traceback, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2013.
DOI : 10.1109/INFCOMW.2013.6970722

K. Wang, H. Zhou, Y. Qin, and H. Zhang, Cooperative-Filter: countering Interest flooding attacks in named data networking, Soft Computing, vol.8, issue.3, pp.1803-1813, 2014.
DOI : 10.1016/S0019-9958(65)90241-X

A. Afanasyev, I. Moiseenko, and L. Zhang, ndnSIM: NDN simulator for NS-3, " the NDN project team, 2012.

T. N. Nguyen, R. Cogranne, and G. Doyen, An optimal statistical test for robust detection against interest flooding attacks in CCN, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp.252-260, 2015.
DOI : 10.1109/INM.2015.7140299

T. N. Nguyen, R. Cogranne, G. Doyen, and F. Retraint, Detection of interest flooding attacks in Named Data Networking using hypothesis testing, 2015 IEEE International Workshop on Information Forensics and Security (WIFS), pp.1-6, 2015.
DOI : 10.1109/WIFS.2015.7368571

H. Yuan, T. Song, and P. Crowley, Scalable NDN Forwarding: Concepts, Issues and Principles, 2012 21st International Conference on Computer Communications and Networks (ICCCN), pp.1-9, 2012.
DOI : 10.1109/ICCCN.2012.6289305

URL : http://www.cse.wustl.edu/~yuanh/publications/2012_Yuan_ICCCN.pdf

S. Marchal, J. François, C. Wagner, and T. Engel, Semantic Exploration of DNS, Proceeding of the 11th International IFIP TC 6 Networking Conference, pp.370-384, 2012.
DOI : 10.1007/978-3-642-30045-5_28

URL : https://hal.archives-ouvertes.fr/hal-00712849

]. P. Kolb, DISCO: A Multilingual Database of Distributionally Similar Words, pp.37-44, 2008.

N. Spring, R. Mahajan, and D. Wetherall, Measuring ISP topologies with rocketfuel, ACM SIGCOMM Computer Communication Review, vol.32, issue.4, pp.133-145, 2002.
DOI : 10.1145/964725.633039