Network Functions Virtualisation (NFV) White Paper 1, ETSI NFV ISG (2012) available at: https://portal.etsi ,
Anomaly detection framework for SFC integrity in NFV environments, 2017 IEEE Conference on Network Softwarization (NetSoft), p.2017 ,
DOI : 10.1109/NETSOFT.2017.8004204
Network Functions Virtualisation (NFV) -Management and Orchestration. White paper, ETSI NFV ISG, 2014. ,
To Docker or Not to Docker: A Security Perspective, IEEE Cloud Computing, vol.3, issue.5, pp.54-62, 2016. ,
DOI : 10.1109/MCC.2016.100
Assessment of Hypervisor Vulnerabilities, 2016 International Conference on Cloud Computing Research and Innovations (ICCCRI), pp.71-77, 2016. ,
DOI : 10.1109/ICCCRI.2016.19
A shared memory based cross-vm side channel attacks in iaas cloud, IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp.181-186, 2016. ,
A scalable anomaly detection and mitigation architecture for legacy networks via an OpenFlow middlebox, Security and Communication Networks, vol.46, issue.2, 1958. ,
DOI : 10.1016/j.comnet.2004.03.033
Statistical-based Anomaly Detection for NFV Services, IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN). (2016) ,
Anomaly Detection and Root Cause Localization in Virtual Network Functions, 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE), pp.196-206, 2016. ,
DOI : 10.1109/ISSRE.2016.32
URL : https://hal.archives-ouvertes.fr/hal-01419014
Network Functions Virtualisation (NFV) -NFV Security: Problem Statement. White paper, ETSI NFV ISG, 2014. ,
Data Modelling for the Evaluation of Virtualized Network Functions Resource Allocation Algorithms Computing Research Repository (CoRR) abs/1702, p.369, 2017. ,
Making Middleboxes Someone else's Problem: Network Processing As a Cloud Service, ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, pp.13-24, 2012. ,
DOI : 10.1145/2342356.2342359
Worldwide infrastructure security report Available at: https://www.arbornetworks.com/insight-into-the-global-threat-landscape, Arbor Networks, 2017. ,