L. Allodi, Economic factors of vulnerability trade and exploitation, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp.1483-1499, 2017.

E. Altman, A. Avritzer, R. El-azouzi, L. Daniel-s-menasche, and . Pfleger-de-aguiar, Rejuvenation and the spread of epidemics in general topologies, 2014 IEEE International Symposium on Software Reliability Engineering Workshops, pp.414-419, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01087263

R. Anderson and T. Moore, The economics of information security, Science, vol.314, pp.610-613, 2006.

M. Roy, R. Anderson, and . May, Vaccination and herd immunity to infectious diseases, Nature, vol.318, p.323, 1985.

M. Antonakakis, T. April, M. Bailey, M. Bernhard, E. Bursztein et al., Understanding the Mirai botnet, 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, pp.1093-1110, 2017.

A. Avritzer, R. G. Cole, and E. J. Weyuker, Methods and opportunities for rejuvenation in aging distributed software systems, Journal of Systems and Software, vol.83, pp.1568-1578, 2010.

Z. Bederna and T. Szadeczky, Cyber espionage through Botnets, Security Journal, pp.1-20, 2019.

L. Böck, E. Vasilomanolakis, J. H. Wolf, and M. Mühlhäuser, Autonomously detecting sensors in fully distributed botnets, Computers & Security, vol.83, pp.1-13, 2019.

J. , M. Borello, and L. Mé, Code obfuscation techniques for metamorphic viruses, Journal in Computer Virology, vol.4, pp.211-220, 2008.
URL : https://hal.archives-ouvertes.fr/hal-00353061

M. Brisson, J. William, and . Edmunds, Economic evaluation of vaccination programs: the impact of herd-immunity, Medical Decision Making, vol.23, pp.76-82, 2003.

L. Buttyán and J. Hubaux, Security and Cooperation in Wireless Networks, 2007.

E. Cator, . Donnelly, and . Van-mieghem, Reply to Comment on Nodal infection in Markovian susceptible-infected-susceptible and susceptible-infected-removed epidemics on networks are non-negatively correlated, Physical review. E, vol.98, p.26302, 2018.

E. Cator and . Van-mieghem, Nodal infection in Markovian SIS and SIR epidemics on networks are non-negatively correlated, Physical Review E, vol.89, p.52802, 2014.

D. Chakrabarti, Y. Wang, C. Wang, J. Leskovec, and C. Faloutsos, Epidemic thresholds in real networks, ACM Transactions on Information and System Security (TISSEC), vol.10, p.1, 2008.

M. Darboux, Sur la méthode d'approximation de Newton, Nouvelles Annales de Mathématiques, vol.8, pp.17-27, 1869.

D. Dey and G. Zhang, Impact of Network Externality in the Security Software Market, Theory in Economics of Information System, 2011.

O. Diekmann, J. A. , P. Heesterbeek, and J. Metz, The legacy of Kermack and McKendrick, Publications of the Newton Institute, vol.5, pp.95-115, 1995.

Z. Durumeric, F. Li, J. Kasten, J. Amann, J. Beekman et al., The Matter of Heartbleed, Proceedings of the Internet Measurement Conference (IMC '14, pp.475-488, 2014.

Z. Durumeric, E. Wustrow, and . Halderman, ZMap: Fast Internet-wide Scanning and Its Security Applications, USENIX Security Symposium, 2013.

C. Enyioha, A. Jadbabaie, V. Preciado, and G. Pappas, Distributed resource allocation for epidemic control, 2015.

E. Paul and . Fine, Herd immunity: history, theory, practice, Epidemiologic Reviews, vol.15, pp.265-302, 1993.

M. Gardner, C. Beard, and D. Medhi, Using SEIRS Epidemic Models for IoT Botnets Attacks, DRCN 2017-Design of Reliable Communication Networks; 13th International Conference, pp.1-8, 2017.

M. Garetto, W. Gong, and D. Towsley, Modeling malware spreading dynamics, Proc. of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, vol.3, pp.1869-1879, 2003.

X. Michel, L. Goemans, . Li, S. Vahab, M. Mirrokni et al., Market sharing games applied to content distribution in ad hoc networks, IEEE Journal on Selected Areas in Communications, vol.24, issue.5, pp.1020-1033, 2006.

J. Grossklags, N. Christin, and J. Chuang, Secure or insure?: a game-theoretic analysis of information security games, Proc. 17th International Conference on World Wide Web, pp.209-218, 2008.

M. Grottke, A. Avritzer, S. Daniel, L. P. Menasché, E. De-aguiar et al., On the Efficiency of Sampling and Countermeasures to Critical-Infrastructure-Targeted Malware Campaigns, ACM SIGMETRICS Performance Evaluation Review, vol.43, pp.33-42, 2016.

S. Gupta, A. Singhal, and A. Kapoor, A literature survey on social engineering attacks: Phishing attack, 2016 International Conference on Computing, Communication and Automation, pp.537-540, 2016.

Z. Han, D. Niyato, and W. Saad, Game theory in wireless and communication networks: theory, models, and applications, 2012.

A. Haurie and P. Marcotte, On the relationship between Nash-Cournot and Wardrop equilibria, Networks, vol.15, pp.295-308, 1985.

Y. Hayel, S. Trajanovski, E. Altman, H. Wang, and P. Van-mieghem, Complete game-theoretic characterization of SIS epidemics protection strategies, IEEE 53rd Annual Conference on Decision and Control (CDC, pp.1179-1184, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01054710

D. Helbing, D. Brockmann, T. Chadefaux, K. Donnay, U. Blanke et al., Saving Human Lives: What Complexity Science and Information Systems can Contribute, Journal of Statistical Physics, vol.158, issue.3, pp.735-781, 2014.

A. Iqbal, M. Guo, L. Gunn, M. A. Babar, and D. Abbott, Game theoretical modelling of network/cyber security, IEEE Access, vol.7, pp.154167-154179, 2019.

Y. Jenq, On the stability of slotted ALOHA systems, IEEE Transactions on Communications, vol.28, pp.1936-1939, 1980.

P. Johansson and R. Forchheimer, Information networks slides, 2019.

J. John and R. Samuel, Herd immunity and herd effect: new insights and definitions, European Journal of Epidemiology, vol.16, pp.601-606, 2000.

J. Matt, K. Keeling, and . Eames, Networks and epidemic models, Journal of the Royal Society Interface, vol.2, pp.295-307, 2005.

P. Frank and . Kelly, Reversibility and Stochastic Networks, 1979.

O. William, A. G. Kermack, and . Mckendrick, A contribution to the mathematical theory of epidemics, Proceedings of the Royal Society of London (Series A), vol.115, pp.700-721, 1927.

L. D. Landau and E. M. Lifshitz, Statistical Physics (Course of Theoretical Physics, vol.5, 1984.

W. Liu, C. Liu, X. Liu, S. Cui, and X. Huang, Modeling the spread of malware with the influence of heterogeneous immunization, Applied Mathematical Modelling, vol.40, pp.3141-3152, 2016.

Q. Ma, E. Yeh, and J. Huang, How Bad is Selfish Caching, Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp.11-20, 2019.

P. Maillé, P. Reichl, and B. Tuffin, Interplay between Security Providers, Consumers, and Attackers: A Weighted Congestion Game Approach, International Conference on Decision and Game Theory for Security, pp.67-86, 2011.

A. Marzano, D. Alexander, O. Fonseca, E. Fazzion, C. Hoepers et al., The Evolution of Bashlite and Mirai IoT Botnets, 2018 IEEE Symposium on Computers and Communications (ISCC), pp.813-818, 2018.

P. Mell, K. Scarfone, and S. Romanosky, Common vulnerability scoring system, IEEE Security & Privacy, vol.4, issue.6, pp.85-89, 2006.

L. Metongnon and R. Sadre, Fast and efficient probing of heterogeneous IoT networks, International Journal of Network Management, vol.28, p.1, 2018.

O. Philip, S. Kane, K. Sezer, and . Mclaughlin, Obfuscation: The hidden malware, IEEE Security & Privacy, vol.9, pp.41-47, 2011.

J. Martin, A. Osborne, and . Rubinstein, A Course in Game Theory, 1994.

R. Pastor-satorras, C. Castellano, P. Van-mieghem, and A. Vespignani, Epidemic processes in complex networks, Reviews of Modern Physics, vol.87, p.925, 2015.

N. Paul, S. Gurumurthi, and D. Evans, Towards disk-level malware detection, Code Based Software Security Assessments, p.13, 2005.

B. Qu and H. Wang, The Accuracy of Mean-Field Approximation for Susceptible-Infected-Susceptible Epidemic Spreading with Heterogeneous Infection Rates, International Workshop on Complex Networks and their Applications, pp.499-510, 2016.

A. Quach, Z. Wang, and Z. Qian, Investigation of the 2016 Linux TCP Stack Vulnerability at Scale, Proceedings of the ACM on Measurement and Analysis of Computing Systems, vol.1, p.4, 2017.

A. Rufino, . Menasché, . Lima, . Cunha, and . Altman,

A. Ramachandran, D. Dagon, and N. Feamster, Can DNS-based blacklists keep up with bots, CEAS 2016 -The Third Conference on Email and Anti-Spam, 2006.

J. Ren and Y. Xu, A compartmental model to explore the interplay between virus epidemics and honeynet potency, Applied Mathematical Modelling, vol.59, pp.86-99, 2018.

P. Richter and A. Berger, Scanning the Scanners: Sensing the Internet from a Massively Distributed Network Telescope, Proceedings of the ACM Internet Measurement Conference, pp.144-157, 2019.

A. Pablo-m-rodríguez, L. A. Roldán-correa, and . Valencia, Comment on "Nodal infection in Markovian susceptibleinfected-susceptible and susceptible-infected-removed epidemics on networks are non-negatively correlated, Physical Review E, vol.98, p.26301, 2018.

M. Rouse, Cybersecurity insurance, 2019.

S. Singh and . Christopher-r-myers, Outbreak statistics and scaling laws for externally driven epidemics, Physical Review E, vol.89, p.42108, 2014.

N. Skorin-kapov, M. Furdek, S. Zsigmond, and L. Wosinska, Physical-layer security in evolving optical networks, IEEE Communications Magazine, vol.54, pp.110-117, 2016.

K. Thomas, M. David, and . Nicol, The Koobface botnet and the rise of social malware, 5th International Conference on Malicious and Unwanted Software, pp.63-70, 2010.

P. Van-mieghem, The N-intertwined SIS epidemic network model, Computing, vol.93, pp.147-169, 2011.

. Van-mieghem, Approximate formula and bounds for the time-varying susceptible-infected-susceptible prevalence in networks, Physical Review E, vol.93, p.52312, 2016.

P. Van-mieghem and E. Cator, Epidemics in networks with nodal self-infection and the epidemic threshold, Physical Review E, vol.86, p.16116, 2012.

P. Van-mieghem, J. Omic, and R. Kooij, Virus spread in networks, IEEE/ACM Transactions on Networking (ToN), vol.17, pp.1-14, 2009.

B. Vignau, R. Khoury, and S. Hallé, 10 Years of IoT Malware: a Feature-Based Taxonomy, 2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion, pp.458-465, 2019.

B. Wang, X. Li, L. Aguiar, Z. Daniel-s-menasche, and . Shafiq, Characterizing and Modeling Patching Practices of Industrial Control Systems, Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS), vol.1, p.18, 2017.

S. Wang and N. Shroff, Security Game with Non-additive Utilities and Multiple Attacker Resources, Proceedings of the ACM on Measurement and Analysis of Computing Systems, vol.1, 2017.

Y. Wang, D. Chakrabarti, C. Wang, and C. Faloutsos, Epidemic spreading in real networks: An eigenvalue viewpoint, 22nd International Symposium on Reliable Distributed Systems, pp.25-34, 2003.

Z. Wang, C. T. Bauch, S. Bhattacharyya, A. Onofrio, P. Manfredi et al., Statistical physics of vaccination, Physics Reports, vol.664, pp.1-113, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01597313

Z. Wang, Y. Moreno, S. Boccaletti, and M. Perc, Vaccination and epidemics in networked populations -an introduction, 2017.

S. Weinberger, Computer security: Is this the start of cyberwarfare?, Nature, vol.474, pp.142-145, 2011.

S. Samuel and . Wilks, Moments and distributions of estimates of population parameters from fragmentary samples, The Annals of Mathematical Statistics, vol.3, pp.163-195, 1932.

M. Xu and L. Hua, Cybersecurity Insurance: Modeling and Pricing, North American Actuarial Journal, vol.23, pp.220-249, 2019.

S. Yi, W. Patrick, . Nelson, and . Ulsoy, Time-delay systems: analysis and control using the Lambert W function, 2010.

, Network Process: How Topology Impacts the Dynamics of Epidemics and Cascading Failures, 2015.

J. Zhang, M. José, and . Moura, Diffusion in social networks as SIS epidemics: Beyond full mixing and complete graphs, IEEE Journal of Selected Topics in Signal Processing, vol.8, pp.537-551, 2014.

J. Zhang, M. José, and . Moura, Contact process with exogenous infection and the scaled SIS process, Journal of Complex Networks, vol.5, pp.712-733, 2017.

J. Zhang and J. M. Moura, Who is More at Risk in Heterogenous Networks, Proc. 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.1-5, 2018.

L. Cliff-changchun-zou, W. Gao, D. Gong, and . Towsley, Monitoring and early warning for Internet worms, Proceedings of the 10th ACM Conference on Computer and Communications Security, pp.190-199, 2003.

W. Cliff-changchun-zou, D. Gong, and . Towsley, Worm propagation modeling and analysis under dynamic quarantine defense, Proceedings of the 2003 ACM Workshop on Rapid Malcode, pp.51-60, 2003.