A. Ain, M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, Rank correlation for low-rate ddos attack detection: An empirical evaluation, I. J. Network Security, vol.18, issue.3, pp.474-480, 2016.

E. S. Al-shaer and H. H. Hamed, Discovery of policy anomalies in distributed firewalls, Proceedings of the Twenty-third Annual Joint Conference of the IEEE Computer and Communications, 2004.

T. Ball, N. Bjørner, A. Gember, S. Itzhaky, A. Karbyshev et al., Vericon: Towards Verifying Controller Programs in Software-Defined Networks, Proc. 35th ACM SIGPLAN Intl. Conf. Programming Language Design (PLDI'14), pp.282-293, 2014.

D. Barthel, J. Vasseur, K. Pister, M. Kim, and N. Dejean, Routing Metrics Used for Path Calculation in Low-Power and Lossy Networks, RFC, vol.6551, 2012.

A. Biere, M. Heule, H. Van-maaren, and T. Walsch, Handbook of satisfiability, 2008.

X. Chen and J. Heidemann, Detecting early worm propagation through packet matching, USC/Information Sciences Institute, 2004.

B. Claise, Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of, IP Tra c Flow Information. RFC, vol.5101, 2008.

E. M. Clarke, The birth of model checking, 25 Years of Model Checking, vol.5000, pp.1-26, 2008.

R. Ensafi, J. C. Park, D. Kapur, and J. R. Crandall, Idle port scanning and non-interference analysis of network protocol stacks using model checking, Proceedings of the 19th USENIX Conference on Security, pp.17-17, 2010.

V. Forejt, M. Kwiatkowska, G. Norman, and D. Parker, Automated verification techniques for probabilistic systems, Formal Methods for Eternal Networked Software Systems (SFM'11), vol.6659, pp.53-113, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00648037

N. Foster, M. J. Freedman, A. Guha, R. Harrison, N. P. Kata et al., Languages for Software-Defined Networks. In: Software Technology Group, 2016.

N. Foster, M. J. Freedman, R. Harrison, C. Monsanto, and D. Walker, Frenetic, a Network Programming Language, Proceedings of the 16th ACM SIGPLAN International Conference on Functional Programming, 2011.

S. García, M. Grill, J. Stiborek, and A. Zunino, An empirical comparison of botnet detection methods, Comput. Secur, vol.45, pp.100-123, 2014.

M. J. Handley and E. Rescorla, Internet Architecture Board: Internet Denial-of-Service Considerations, RFC, vol.4732, 2006.

G. Hurel, R. Badonnel, A. Lahmadi, and O. Festor, Behavioral and Dynamic Security Functions Chaining for Android Devices, Proceedings of the 11th IFIP/IEEE/ACM SIGCOMM International Conference on Network and Service Management (CNSM'15, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01231173

G. Hurel, R. Badonnel, A. Lahmadi, and O. Festor, Towards Cloud Based Compositions of Security Functions for Mobile Devices, IFIP/IEEE International Symposium on Integrated Network Management (IM'15, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01093041

H. Kim, J. Reich, A. Gupta, M. Shahbaz, N. Feamster et al., Kinetic: Verifiable Dynamic Network Control, Proceedings of the 12th USENIX Conference on Networked Systems Design and Implementation (NSDI'15, 2015.

A. Lahmadi, F. Beck, E. Finickel, and O. Festor, A platform for the analysis and visualization of network flow data of android environments, IFIP/IEEE International Symposium on Integrated Network Management (IM, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01242911

,

G. S. Malkin and T. L. Parker, Internet Users' Glossary. RFC 1392, 1993.

N. Schnepf, R. Badonnel, A. Lahmadi, and S. Merz, Automated factorization of security chains in software-defined networks, 2018.
URL : https://hal.archives-ouvertes.fr/hal-02111656

N. Schnepf, S. Merz, R. Badonnel, and A. Lahmadi, Automated verification of security chains in software-defined networks with Synaptic, Proceedings of the 3rd IEEE Conference on Network Softwarization (NetSoft'17, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01630806

N. Schnepf, S. Merz, R. Badonnel, and A. Lahmadi, Towards generation of SDN policies for protecting android environments based on automata learning, Proceedings of the 16th Network Operations and Management Symposium (IEEE/IFIP NOMS'18), 2018.

A. Sperotto, Flow-based intrusion detection, 2010.
URL : https://hal.archives-ouvertes.fr/hal-01529782