. Montimage-website, Available: http://www.montimage.com/products.html [2] NDN. Available: https://named-data

R. Wojtczuk, Poacher turned gamekeeper: Lessons learned from eight years of breaking hypervisors, 2014.

A. R. Riddle, A Survey on the Security of Hypervisors in Cloud Computing, 2015 IEEE 35th International Conference on Distributed Computing Systems Workshops, 2015.
DOI : 10.1109/ICDCSW.2015.28

G. Wang, Z. J. Estrada, C. Pham, Z. R. Kalbarczyk, and . Iyer, Hypervisor Introspection: A Technique for Evading Passive Virtual Machine Monitoring, 2015.

D. Kreutz, F. M. Ramos, and A. P. Verissimo, Towards Secure and Dependable Software-Defined Networks Floodlight OpenFlow Controller, 2013.
DOI : 10.1145/2491185.2491199

URL : http://www.ietf.org/proceedings/87/slides/slides-87-sdnrg-2/

S. Shin, Rosemary, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, 2014.
DOI : 10.1145/2491185.2491212

N. Vulnerability-database and P. Gasti, Available: https DoS and DDoS in Named Data Networking, Computer Communications and Networks (ICCCN). In: Conference on. IEEE, pp.1-7, 2013.

H. Dai, Mitigate DDoD attacks in NDN by Interest traceback, 2013.
DOI : 10.1109/infcomw.2013.6970722

A. Compagno, Poseidon: Mitigating interest flooding DDoS attacks in Named Data Networking, 38th Annual IEEE Conference on Local Computer Networks, pp.630-638, 2013.
DOI : 10.1109/LCN.2013.6761300

URL : http://arxiv.org/abs/1303.4823

A. Afanasyev, Interest flooding attack and countermeasures in Named Data Networking, IFIP Networking Conference. IEEE. 2013, pp.1-9, 2013.

T. Nguyen, R. Cogranne, and G. Doyen, An optimal statistical test for robust detection against interest flooding attacks in CCN, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp.252-260, 2015.
DOI : 10.1109/INM.2015.7140299

T. N. Nguyen, Detection of interest flooding attacks in Named Data Networking using hypothesis testing, 2015 IEEE International Workshop on Information Forensics and Security (WIFS), pp.1-6, 2015.
DOI : 10.1109/WIFS.2015.7368571

M. Virgilio, G. Marchetto, and R. Sisto, PIT overload analysis in content centric networks, Proceedings of the 3rd ACM SIGCOMM workshop on Information-centric networking, ICN '13, pp.67-72, 2013.
DOI : 10.1145/2491224.2491225

URL : http://conferences.sigcomm.org/sigcomm/2013/papers/icn/p67.pdf

M. Vahlenkamp, F. Schneider, D. Kutscher, and J. Seedorf, Enabling Information Centric Networking in IP Networks Using SDN, 2013 IEEE SDN for Future Networks and Services (SDN4FNS), pp.1-6, 2013.
DOI : 10.1109/SDN4FNS.2013.6702539

S. Salsano, N. Blefari-melazzi, A. Detti, G. Morabito, and L. Veltri, Information centric networking over SDN and OpenFlow: Architectural aspects and experiments on the OFELIA testbed, Computer Networks, vol.57, issue.16, pp.3207-3221, 2013.
DOI : 10.1016/j.comnet.2013.07.031

URL : http://arxiv.org/pdf/1301.5933

N. L. Van-adrichem and F. A. Kuipers, NDNFlow: Software-defined Named Data Networking, Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft), pp.1-5, 2015.
DOI : 10.1109/NETSOFT.2015.7116131

X. N. Nguyen, D. Saucez, and T. Turletti, Efficient caching in content-centric networks using OpenFlow, INFOCOM, Proceedings IEEE, pp.1-2, 2013.
DOI : 10.1109/infcomw.2013.6562846

URL : https://hal.archives-ouvertes.fr/hal-00790002

P. Talebifard, R. Ravindran, A. Chakraborti, J. Pan, A. Mercian et al., An Information, 2015.