L. A. Adamic, Zipf, Power-laws and Pareto -a ranking tutorial, 2002.

F. Anjum, D. Subhadrabandhu, S. Sarkar, and R. Shetty, On optimal placement of intrusion detection modules in sensor networks, First International Conference on Broadband Networks, pp.690-699, 2004.
DOI : 10.1109/BROADNETS.2004.52

. Apple-inc, Bonjour for developers, https://developer.apple.com/bonjour/index.html, [Online, 2014.

S. M. Bellovin, A. Keromytis, and B. Cheswick, Worm propagation strategies in an IPv6 Internet, pp.70-76, 2006.

T. N. Bui and C. Jones, Finding good approximate vertex and edge partitions is NP-hard, Information Processing Letters, vol.42, issue.3, pp.153-159, 1992.
DOI : 10.1016/0020-0190(92)90140-Q

P. Chen and A. O. Iii, Node removal vulnerability of the largest component of a network, 2013 IEEE Global Conference on Signal and Information Processing, 1403.
DOI : 10.1109/GlobalSIP.2013.6736946

T. Chown, Rfc 5157: Ipv6 implications for network scanning, Internet Engineering Task Force (IETF) RFC, 2008.
DOI : 10.17487/rfc5157

A. Clauset, C. R. Shalizi, and M. E. Newman, Power-Law Distributions in Empirical Data, SIAM Review, vol.51, issue.4, pp.661-703, 2009.
DOI : 10.1137/070710111

URL : http://arxiv.org/pdf/0706.1062

R. Cohen, K. Erez, D. Ben-avraham, and S. Havlin, Breakdown of the Internet under Intentional Attack, Physical Review Letters, vol.7, issue.16, pp.3682-3685, 2001.
DOI : 10.1017/S0963548398003526

S. Convery and D. Miller, Ipv6 and ipv4 threat comparison and best-practice evaluation , http://www.cisco.com/web/about/security/security services/ciag/documents/v6- v4-threats.pdf, [Online, 2014.

C. Gkantsidis, M. Mihail, and E. Zegura, The markov chain simulation method for generating connected power law random graphs, Proc. 5th Workshop on Algorithm Engineering and Experiments (ALENEX, 2003.

S. L. Hakimi, On Realizability of a Set of Integers as Degrees of the Vertices of a Linear Graph. I, Journal of the Society for Industrial and Applied Mathematics, vol.10, issue.3, pp.496-506, 1962.
DOI : 10.1137/0110037

V. Havel, A remark on the existence of finite graphs, Casopis Pest. Mat, vol.80, pp.477-480, 1955.

B. J. Landry, M. S. Koger, S. Blanke, and C. Nielsen, Using the Private-Internet-Enterprise (PIE) Model to Examine IT Risks and Threats Due to Porous Perimeters, Information Security Journal: A Global Perspective, vol.14, issue.4, pp.163-169, 2009.
DOI : 10.1504/IJSS.2006.009755

L. Li, D. Alderson, J. C. Doyle, and W. Willinger, Towards a Theory of Scale-Free Graphs: Definition, Properties, and Implications, Internet Mathematics, vol.2, issue.4, pp.431-523, 2005.
DOI : 10.1080/15427951.2005.10129111

N. Madar, T. Kalisky, R. Cohen, D. Ben-avraham, and S. Havlin, Immunization and epidemic dynamics in complex networks, The European Physical Journal B - Condensed Matter, vol.38, issue.2, pp.269-276, 2004.
DOI : 10.1140/epjb/e2004-00119-8

URL : http://www.wisdom.weizmann.ac.il/~recohen/publications/epi.ps.gz

P. Mell and R. E. Harang, Using Network Tainting to Bound the Scope of Network Ingress Attacks, 2014 Eighth International Conference on Software Security and Reliability, pp.206-215, 2014.
DOI : 10.1109/SERE.2014.34

M. E. Newman, Mixing patterns in networks, Physical Review E, vol.42, issue.2, p.26126, 2003.
DOI : 10.1137/S0036144500371907

URL : http://arxiv.org/pdf/cond-mat/0209450

F. Nian and X. Wang, Efficient immunization strategies on complex networks, Journal of Theoretical Biology, vol.264, issue.1, pp.77-83, 2010.
DOI : 10.1016/j.jtbi.2010.01.007

S. Noel and S. Jajodia, Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs, Journal of Network and Systems Management, vol.45, issue.4, pp.259-275, 2008.
DOI : 10.1007/s10922-008-9109-x

R. Pastor-satorras and A. Vespignani, Immunization of complex networks, Physical Review E, vol.292, issue.3, p.36104, 2002.
DOI : 10.1126/science.1061076

R. E. Sawilla and X. Ou, Identifying Critical Attack Assets in Dependency Attack Graphs, Proc. of the 13th European Symposium on Research in Computer Security: Computer Security, pp.18-3408, 2008.
DOI : 10.1007/978-3-540-85933-8_7

URL : http://cis.ksu.edu/~xou/publications/esorics08.pdf

C. M. Schneider, T. Mihaljev, S. Havlin, and H. J. Herrmann, Suppressing epidemics with a limited amount of immunization units, Physical Review E, vol.5, issue.6, p.61911, 2011.
DOI : 10.1002/rsa.3240060204

S. Shaikh, H. Chivers, P. Nobles, J. Clark, and H. Chen, A Deployment Value Model for Intrusion Detection Sensors, Advances in Information Security and Assurance, pp.250-259, 2009.
DOI : 10.1109/SECPRI.2002.1004377

URL : http://www-users.cs.york.ac.uk/~jac/PublishedPapers/DeploymentValue.pdf

N. Talele, J. Teutsch, R. F. Erbacher, and T. Jaeger, Monitor placement for largescale systems, Proc. of the 19th ACM Symposium on Access Control Models and Technologies, pp.29-40, 2014.
DOI : 10.1145/2613087.2613107

URL : http://people.cs.uchicago.edu/~teutsch/papers/SACMAT_2014.pdf

N. Talele, J. Teutsch, T. Jaeger, and R. Erbacher, Using Security Policies to Automate Placement of Network Intrusion Prevention, Engineering Secure Software and Systems, pp.17-32, 2013.
DOI : 10.1007/978-3-642-36563-8_2

H. Tong, B. Prakash, C. Tsourakakis, T. Eliassi-rad, C. Faloutsos et al., On the Vulnerability of Large Graphs, 2010 IEEE International Conference on Data Mining, pp.1091-1096, 2010.
DOI : 10.1109/ICDM.2010.54