Economic factors of vulnerability trade and exploitation, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp.1483-1499, 2017. ,
Rejuvenation and the spread of epidemics in general topologies, 2014 IEEE International Symposium on Software Reliability Engineering Workshops, pp.414-419, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01087263
The economics of information security, Science, vol.314, pp.610-613, 2006. ,
Vaccination and herd immunity to infectious diseases, Nature, vol.318, p.323, 1985. ,
Understanding the Mirai botnet, 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, pp.1093-1110, 2017. ,
Methods and opportunities for rejuvenation in aging distributed software systems, Journal of Systems and Software, vol.83, pp.1568-1578, 2010. ,
Cyber espionage through Botnets, Security Journal, pp.1-20, 2019. ,
Autonomously detecting sensors in fully distributed botnets, Computers & Security, vol.83, pp.1-13, 2019. ,
Code obfuscation techniques for metamorphic viruses, Journal in Computer Virology, vol.4, pp.211-220, 2008. ,
URL : https://hal.archives-ouvertes.fr/hal-00353061
Economic evaluation of vaccination programs: the impact of herd-immunity, Medical Decision Making, vol.23, pp.76-82, 2003. ,
Security and Cooperation in Wireless Networks, 2007. ,
Reply to Comment on Nodal infection in Markovian susceptible-infected-susceptible and susceptible-infected-removed epidemics on networks are non-negatively correlated, Physical review. E, vol.98, p.26302, 2018. ,
Nodal infection in Markovian SIS and SIR epidemics on networks are non-negatively correlated, Physical Review E, vol.89, p.52802, 2014. ,
Epidemic thresholds in real networks, ACM Transactions on Information and System Security (TISSEC), vol.10, p.1, 2008. ,
Sur la méthode d'approximation de Newton, Nouvelles Annales de Mathématiques, vol.8, pp.17-27, 1869. ,
Impact of Network Externality in the Security Software Market, Theory in Economics of Information System, 2011. ,
The legacy of Kermack and McKendrick, Publications of the Newton Institute, vol.5, pp.95-115, 1995. ,
The Matter of Heartbleed, Proceedings of the Internet Measurement Conference (IMC '14, pp.475-488, 2014. ,
ZMap: Fast Internet-wide Scanning and Its Security Applications, USENIX Security Symposium, 2013. ,
Distributed resource allocation for epidemic control, 2015. ,
Herd immunity: history, theory, practice, Epidemiologic Reviews, vol.15, pp.265-302, 1993. ,
Using SEIRS Epidemic Models for IoT Botnets Attacks, DRCN 2017-Design of Reliable Communication Networks; 13th International Conference, pp.1-8, 2017. ,
Modeling malware spreading dynamics, Proc. of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, vol.3, pp.1869-1879, 2003. ,
Market sharing games applied to content distribution in ad hoc networks, IEEE Journal on Selected Areas in Communications, vol.24, issue.5, pp.1020-1033, 2006. ,
Secure or insure?: a game-theoretic analysis of information security games, Proc. 17th International Conference on World Wide Web, pp.209-218, 2008. ,
On the Efficiency of Sampling and Countermeasures to Critical-Infrastructure-Targeted Malware Campaigns, ACM SIGMETRICS Performance Evaluation Review, vol.43, pp.33-42, 2016. ,
A literature survey on social engineering attacks: Phishing attack, 2016 International Conference on Computing, Communication and Automation, pp.537-540, 2016. ,
Game theory in wireless and communication networks: theory, models, and applications, 2012. ,
On the relationship between Nash-Cournot and Wardrop equilibria, Networks, vol.15, pp.295-308, 1985. ,
Complete game-theoretic characterization of SIS epidemics protection strategies, IEEE 53rd Annual Conference on Decision and Control (CDC, pp.1179-1184, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01054710
Saving Human Lives: What Complexity Science and Information Systems can Contribute, Journal of Statistical Physics, vol.158, issue.3, pp.735-781, 2014. ,
Game theoretical modelling of network/cyber security, IEEE Access, vol.7, pp.154167-154179, 2019. ,
On the stability of slotted ALOHA systems, IEEE Transactions on Communications, vol.28, pp.1936-1939, 1980. ,
Information networks slides, 2019. ,
Herd immunity and herd effect: new insights and definitions, European Journal of Epidemiology, vol.16, pp.601-606, 2000. ,
Networks and epidemic models, Journal of the Royal Society Interface, vol.2, pp.295-307, 2005. ,
Reversibility and Stochastic Networks, 1979. ,
A contribution to the mathematical theory of epidemics, Proceedings of the Royal Society of London (Series A), vol.115, pp.700-721, 1927. ,
Statistical Physics (Course of Theoretical Physics, vol.5, 1984. ,
Modeling the spread of malware with the influence of heterogeneous immunization, Applied Mathematical Modelling, vol.40, pp.3141-3152, 2016. ,
How Bad is Selfish Caching, Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp.11-20, 2019. ,
Interplay between Security Providers, Consumers, and Attackers: A Weighted Congestion Game Approach, International Conference on Decision and Game Theory for Security, pp.67-86, 2011. ,
The Evolution of Bashlite and Mirai IoT Botnets, 2018 IEEE Symposium on Computers and Communications (ISCC), pp.813-818, 2018. ,
Common vulnerability scoring system, IEEE Security & Privacy, vol.4, issue.6, pp.85-89, 2006. ,
Fast and efficient probing of heterogeneous IoT networks, International Journal of Network Management, vol.28, p.1, 2018. ,
Obfuscation: The hidden malware, IEEE Security & Privacy, vol.9, pp.41-47, 2011. ,
A Course in Game Theory, 1994. ,
Epidemic processes in complex networks, Reviews of Modern Physics, vol.87, p.925, 2015. ,
Towards disk-level malware detection, Code Based Software Security Assessments, p.13, 2005. ,
The Accuracy of Mean-Field Approximation for Susceptible-Infected-Susceptible Epidemic Spreading with Heterogeneous Infection Rates, International Workshop on Complex Networks and their Applications, pp.499-510, 2016. ,
Investigation of the 2016 Linux TCP Stack Vulnerability at Scale, Proceedings of the ACM on Measurement and Analysis of Computing Systems, vol.1, p.4, 2017. ,
,
Can DNS-based blacklists keep up with bots, CEAS 2016 -The Third Conference on Email and Anti-Spam, 2006. ,
A compartmental model to explore the interplay between virus epidemics and honeynet potency, Applied Mathematical Modelling, vol.59, pp.86-99, 2018. ,
Scanning the Scanners: Sensing the Internet from a Massively Distributed Network Telescope, Proceedings of the ACM Internet Measurement Conference, pp.144-157, 2019. ,
Comment on "Nodal infection in Markovian susceptibleinfected-susceptible and susceptible-infected-removed epidemics on networks are non-negatively correlated, Physical Review E, vol.98, p.26301, 2018. ,
Cybersecurity insurance, 2019. ,
Outbreak statistics and scaling laws for externally driven epidemics, Physical Review E, vol.89, p.42108, 2014. ,
Physical-layer security in evolving optical networks, IEEE Communications Magazine, vol.54, pp.110-117, 2016. ,
The Koobface botnet and the rise of social malware, 5th International Conference on Malicious and Unwanted Software, pp.63-70, 2010. ,
The N-intertwined SIS epidemic network model, Computing, vol.93, pp.147-169, 2011. ,
Approximate formula and bounds for the time-varying susceptible-infected-susceptible prevalence in networks, Physical Review E, vol.93, p.52312, 2016. ,
Epidemics in networks with nodal self-infection and the epidemic threshold, Physical Review E, vol.86, p.16116, 2012. ,
Virus spread in networks, IEEE/ACM Transactions on Networking (ToN), vol.17, pp.1-14, 2009. ,
10 Years of IoT Malware: a Feature-Based Taxonomy, 2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion, pp.458-465, 2019. ,
Characterizing and Modeling Patching Practices of Industrial Control Systems, Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS), vol.1, p.18, 2017. ,
Security Game with Non-additive Utilities and Multiple Attacker Resources, Proceedings of the ACM on Measurement and Analysis of Computing Systems, vol.1, 2017. ,
Epidemic spreading in real networks: An eigenvalue viewpoint, 22nd International Symposium on Reliable Distributed Systems, pp.25-34, 2003. ,
Statistical physics of vaccination, Physics Reports, vol.664, pp.1-113, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01597313
Vaccination and epidemics in networked populations -an introduction, 2017. ,
Computer security: Is this the start of cyberwarfare?, Nature, vol.474, pp.142-145, 2011. ,
Moments and distributions of estimates of population parameters from fragmentary samples, The Annals of Mathematical Statistics, vol.3, pp.163-195, 1932. ,
Cybersecurity Insurance: Modeling and Pricing, North American Actuarial Journal, vol.23, pp.220-249, 2019. ,
Time-delay systems: analysis and control using the Lambert W function, 2010. ,
, Network Process: How Topology Impacts the Dynamics of Epidemics and Cascading Failures, 2015.
Diffusion in social networks as SIS epidemics: Beyond full mixing and complete graphs, IEEE Journal of Selected Topics in Signal Processing, vol.8, pp.537-551, 2014. ,
Contact process with exogenous infection and the scaled SIS process, Journal of Complex Networks, vol.5, pp.712-733, 2017. ,
Who is More at Risk in Heterogenous Networks, Proc. 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.1-5, 2018. ,
Monitoring and early warning for Internet worms, Proceedings of the 10th ACM Conference on Computer and Communications Security, pp.190-199, 2003. ,
Worm propagation modeling and analysis under dynamic quarantine defense, Proceedings of the 2003 ACM Workshop on Rapid Malcode, pp.51-60, 2003. ,