G. Goldszmidt and Y. Yemini, Distributed management by delegation, Proceedings of 15th International Conference on Distributed Computing Systems, 1995.
DOI : 10.1109/ICDCS.1995.500036

J. Schoenwaelder and J. Quittek, Secure management by delegation within the Internet management framework, Integrated Network Management VI. Distributed Management for the Networked Millennium. Proceedings of the Sixth IFIP/IEEE International Symposium on Integrated Network Management. (Cat. No.99EX302), 1999.
DOI : 10.1109/INM.1999.770716

C. Gkantsidis, T. Karagiannis, P. Rodriguez, and M. Vojnovic, Planet scale software updates, Proc. ACM SIGCOMM, 2006.
DOI : 10.1145/1151659.1159961

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.638.8341

G. Doyen, E. Nataf, and O. Festor, A Hierarchical Architecture for a Distributed Management of P2P Networks and Services, DSOM, ser. Lecture Notes in Computer Science, pp.257-268, 2005.
DOI : 10.1007/978-3-540-30468-5_35

URL : https://hal.archives-ouvertes.fr/inria-00000415

R. Lemos, Major prison time for bot master, 2006.

J. Nazario, Defense and Detection Strategies against Internet Worms, 2003.

W. Stallings, SNMP, SNMPv2, SNMPv3, and RMON 1 and 2, 1998.
DOI : 10.1109/35.663326

P. Szor, The Art of Computer Virus Research and Defense, 2005.

J. Koziol, D. Litchfield, D. Aitel, C. Anley, S. Eren et al., The Shellcoder's Handbook : Discovering and Exploiting Security Holes

D. Tennenhouse and D. Wetherall, Towards an Active Network Architecture, Computer Communication Review, vol.26, issue.2, 1996.

K. Sugauchi, S. Miyazaki, K. Yoshida, S. Nakane, K. Nd-covaci et al., Flexible Network Management Using Active Network Framework, Active Networks : Proc. First International Working Confere nce, IWAN'99, S. Covaci, pp.241-248, 1999.
DOI : 10.1007/978-3-540-48507-0_22

P. Brunner and R. Stadler, The Impact of Active Networking Technology on Service Manageme nt in a Telecom Environment, Proc. Sixth IFIP/IEEE International Symposium on Integrated Network Management (IM'99)

B. Schwartz, A. Jackson, W. Strayer, W. Zhou, D. Rockwell et al., Smart packets: applying active networks to network management, ACM Transactions on Computer Systems, vol.18, issue.1, pp.67-88, 2000.
DOI : 10.1145/332799.332893

J. Koza, Genetic programming as a means for programming computers by natural selection, Statistics and Computing, vol.4, issue.2, 1992.
DOI : 10.1007/BF00175355

A. Adamatzky and M. M. Komosinski, Artificial Life Models in Software, 2005.
DOI : 10.1007/1-84628-214-4

I. Arce and E. Levy, An analysis of the slapper worm, IEEE Security & Privacy Magazine, vol.1, issue.1, 2003.
DOI : 10.1109/MSECP.2003.1177002

D. Goldschlag, M. Reed, and P. Syverson, Hiding Routing information, LNCS, vol.1174, pp.137-150, 1996.
DOI : 10.1007/3-540-61996-8_37

V. Cridlig, O. Festor, and R. State, Role-Based Access Control for XML Enabled Management Gateways, DSOM, ser. Lecture Notes in Computer Science, pp.183-195, 2004.
DOI : 10.1145/775412.775421

URL : https://hal.archives-ouvertes.fr/inria-00100139