Microservices in Practice, Part 1: Reality Check and Service Design, IEEE Software, vol.34, issue.1, pp.91-98, 2017. ,
DOI : 10.1109/MS.2017.24
Building Microservices, 2015. ,
Distributed Systems: Principles and Paradigms, 2007. ,
Microservices tenets, Computer Science - Research and Development, vol.32, issue.5, pp.1-10, 2016. ,
DOI : 10.1109/WICSA.2015.29
A Systematic Survey of Self-Protecting Software Systems, ACM Transactions on Autonomous and Adaptive Systems, vol.8, issue.4, pp.1-1741, 2014. ,
DOI : 10.1109/TSMCB.2006.885306
Building Critical Applications Using Microservices, IEEE Security & Privacy, vol.14, issue.6, pp.86-89, 2016. ,
DOI : 10.1109/MSP.2016.129
Security-as-a-Service for Microservices-Based Cloud Applications, 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom), pp.50-57, 2015. ,
DOI : 10.1109/CloudCom.2015.93
Low-Level Exploitation Mitigation by Diverse Microservices, pp.49-56, 2017. ,
DOI : 10.1007/978-1-4614-0977-9_4
URL : https://hal.archives-ouvertes.fr/hal-01677618
Overcoming Security Challenges in Microservice Architectures, 2018 IEEE Symposium on Service-Oriented System Engineering (SOSE), 2018. ,
DOI : 10.1109/SOSE.2018.00011
A taxonomy of intrusion response systems, International Journal of Information and Computer Security, vol.1, issue.1/2, pp.169-184, 2007. ,
DOI : 10.1504/IJICS.2007.012248
URL : http://lib.dr.iastate.edu/cgi/viewcontent.cgi?article=1193&context=cs_techreports
A Course in Game Theory, 1994. ,
A Survey of Game Theory as Applied to Network Security, 2010 43rd Hawaii International Conference on System Sciences, pp.1-10, 2010. ,
DOI : 10.1109/HICSS.2010.35
URL : http://ais.cs.memphis.edu/files/papers/hicss43.pdf
RRE: A game-theoretic intrusion response and recovery engine, IEEE TPDS, vol.25, issue.2, pp.395-406, 2014. ,
DOI : 10.1109/dsn.2009.5270307
URL : http://www.crhc.uiuc.edu/PERFORM/Papers/USAN_papers/08ZON01.pdf
A Game-Theoretic Approach to Respond to Attacker Lateral Movement, pp.294-313, 2016. ,
DOI : 10.1109/TPDS.2013.211
, Snort official web-site, www.snort.org, [Accessed Feb, 2018.
Ensemble based collaborative and distributed intrusion detection systems: A survey, Journal of Network and Computer Applications, vol.66, pp.1-16, 2016. ,
DOI : 10.1016/j.jnca.2016.03.011
Basic concepts and taxonomy of dependable and secure computing, IEEE Transactions on Dependable and Secure Computing, vol.1, issue.1, pp.11-33, 2004. ,
DOI : 10.1109/TDSC.2004.2
, Compiler-Generated Software Diversity, pp.77-98, 2011.
ADAPT: A Game Inspired Attack-Defense and Performance Metric Taxonomy, IFIP International Information Security Conference, pp.344-365, 2013. ,
DOI : 10.1109/IPDPS.2002.1016475
URL : https://hal.archives-ouvertes.fr/hal-01463837