M. Chiosi, Network Functions Virtualisation (NFV) White Paper 1, ETSI NFV ISG (2012) available at: https://portal.etsi

L. Bondan, T. Wauters, B. Volckaert, F. D. Turck, and L. Z. Granville, Anomaly detection framework for SFC integrity in NFV environments, 2017 IEEE Conference on Network Softwarization (NetSoft), p.2017
DOI : 10.1109/NETSOFT.2017.8004204

J. Quittek, Network Functions Virtualisation (NFV) -Management and Orchestration. White paper, ETSI NFV ISG, 2014.

T. Combe, A. Martin, and R. D. Pietro, To Docker or Not to Docker: A Security Perspective, IEEE Cloud Computing, vol.3, issue.5, pp.54-62, 2016.
DOI : 10.1109/MCC.2016.100

A. Thongthua and S. Ngamsuriyaroj, Assessment of Hypervisor Vulnerabilities, 2016 International Conference on Cloud Computing Research and Innovations (ICCCRI), pp.71-77, 2016.
DOI : 10.1109/ICCCRI.2016.19

Z. Wang, R. Yang, X. Fu, X. Du, and B. Luo, A shared memory based cross-vm side channel attacks in iaas cloud, IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp.181-186, 2016.

K. Giotis, G. Androulidakis, and B. S. Maglaris, A scalable anomaly detection and mitigation architecture for legacy networks via an OpenFlow middlebox, Security and Communication Networks, vol.46, issue.2, 1958.
DOI : 10.1016/j.comnet.2004.03.033

G. K. Xilouris, M. A. Kourtis, G. Gardikis, and I. Koutras, Statistical-based Anomaly Detection for NFV Services, IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN). (2016)

C. Sauvanaud, K. Lazri, M. Kaâniche, and K. Kanoun, Anomaly Detection and Root Cause Localization in Virtual Network Functions, 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE), pp.196-206, 2016.
DOI : 10.1109/ISSRE.2016.32

URL : https://hal.archives-ouvertes.fr/hal-01419014

B. Briscoe, Network Functions Virtualisation (NFV) -NFV Security: Problem Statement. White paper, ETSI NFV ISG, 2014.

W. Rankothge, F. Le, A. Russo, and J. Lobo, Data Modelling for the Evaluation of Virtualized Network Functions Resource Allocation Algorithms Computing Research Repository (CoRR) abs/1702, p.369, 2017.

J. Sherry, S. Hasan, C. Scott, A. Krishnamurthy, S. Ratnasamy et al., Making Middleboxes Someone else's Problem: Network Processing As a Cloud Service, ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, pp.13-24, 2012.
DOI : 10.1145/2342356.2342359

D. Anstee, P. Bowen, C. Chui, and G. Sockrider, Worldwide infrastructure security report Available at: https://www.arbornetworks.com/insight-into-the-global-threat-landscape, Arbor Networks, 2017.