Distributed management by delegation, Proceedings of 15th International Conference on Distributed Computing Systems, 1995. ,
DOI : 10.1109/ICDCS.1995.500036
Secure management by delegation within the Internet management framework, Integrated Network Management VI. Distributed Management for the Networked Millennium. Proceedings of the Sixth IFIP/IEEE International Symposium on Integrated Network Management. (Cat. No.99EX302), 1999. ,
DOI : 10.1109/INM.1999.770716
Planet scale software updates, Proc. ACM SIGCOMM, 2006. ,
DOI : 10.1145/1151659.1159961
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.638.8341
A Hierarchical Architecture for a Distributed Management of P2P Networks and Services, DSOM, ser. Lecture Notes in Computer Science, pp.257-268, 2005. ,
DOI : 10.1007/978-3-540-30468-5_35
URL : https://hal.archives-ouvertes.fr/inria-00000415
Major prison time for bot master, 2006. ,
Defense and Detection Strategies against Internet Worms, 2003. ,
SNMP, SNMPv2, SNMPv3, and RMON 1 and 2, 1998. ,
DOI : 10.1109/35.663326
The Art of Computer Virus Research and Defense, 2005. ,
The Shellcoder's Handbook : Discovering and Exploiting Security Holes ,
Towards an Active Network Architecture, Computer Communication Review, vol.26, issue.2, 1996. ,
Flexible Network Management Using Active Network Framework, Active Networks : Proc. First International Working Confere nce, IWAN'99, S. Covaci, pp.241-248, 1999. ,
DOI : 10.1007/978-3-540-48507-0_22
The Impact of Active Networking Technology on Service Manageme nt in a Telecom Environment, Proc. Sixth IFIP/IEEE International Symposium on Integrated Network Management (IM'99) ,
Smart packets: applying active networks to network management, ACM Transactions on Computer Systems, vol.18, issue.1, pp.67-88, 2000. ,
DOI : 10.1145/332799.332893
Genetic programming as a means for programming computers by natural selection, Statistics and Computing, vol.4, issue.2, 1992. ,
DOI : 10.1007/BF00175355
Artificial Life Models in Software, 2005. ,
DOI : 10.1007/1-84628-214-4
An analysis of the slapper worm, IEEE Security & Privacy Magazine, vol.1, issue.1, 2003. ,
DOI : 10.1109/MSECP.2003.1177002
Hiding Routing information, LNCS, vol.1174, pp.137-150, 1996. ,
DOI : 10.1007/3-540-61996-8_37
Role-Based Access Control for XML Enabled Management Gateways, DSOM, ser. Lecture Notes in Computer Science, pp.183-195, 2004. ,
DOI : 10.1145/775412.775421
URL : https://hal.archives-ouvertes.fr/inria-00100139