R. Ahmed and R. Boutaba, Distributed pattern matching: a key to flexible and efficient P2P search, IEEE Journal on Selected Areas in Communications, vol.25, issue.1, pp.73-83, 2007.
DOI : 10.1109/JSAC.2007.070108

I. Arce and E. Levy, An analysis of the slapper worm, IEEE Security & Privacy Magazine, vol.1, issue.1, pp.82-87, 2003.
DOI : 10.1109/MSECP.2003.1177002

R. Badonnel, R. State, I. Chrisment, and O. Festor, A Management Platform for Tracking Cyber Predators in Peer-to-Peer Networks, Second International Conference on Internet Monitoring and Protection (ICIMP 2007), p.11, 2007.
DOI : 10.1109/ICIMP.2007.2

URL : https://hal.archives-ouvertes.fr/inria-00153620

P. Barford and V. Yegneswaran, An Inside Look at Botnets, 2006.
DOI : 10.1007/978-0-387-44599-1_8

F. Dabek, M. F. Kaashoek, D. Karger, R. Morris, and I. Stoica, « Wide-area cooperative storage with CFS, Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP '01), 2001.
DOI : 10.1145/502034.502054

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.125.41

G. Goldszmidt and Y. Yemini, Distributed management by delegation, Proceedings of 15th International Conference on Distributed Computing Systems, 1995.
DOI : 10.1109/ICDCS.1995.500036

J. B. Grizzard, V. Sharma, C. Nunnery, B. B. Kang, and D. Dagon, « Peer-to-Peer Botnets : Overview and Case Study, First workshop on Hot Topics in Understanding Botnets (HotBots 07), 2007.

K. Lim and R. Stadler, A navigation pattern for scalable Internet management, 2001 IEEE/IFIP International Symposium on Integrated Network Management Proceedings. Integrated Network Management VII. Integrated Management Strategies for the New Millennium (Cat. No.01EX470), 2001.
DOI : 10.1109/INM.2001.918056

K. Lim and R. Stadler, « Real-time views of network traffic using decentralized management », Integrated Network Management, 9th IFIP/IEEE International Symposium on, 2005.

«. Maxima and . Maxima, 14, a computer algebra system, 2007.

L. Mclaughlin and . Bot, Bot software spreads, causes new worries, IEEE Distributed Systems Online, vol.5, issue.6, 2004.
DOI : 10.1109/MDSO.2004.7

H. Ohno and A. Shimizu, « Improved network management using NMW (Network Management Worm) System, Proceedings of INET'95, 1995.

L. Paterson and T. Roscoe, The design principles of PlanetLab, The Design Principles of PlanetLab, pp.11-16, 2006.
DOI : 10.1145/1113361.1113367

K. Ramachandran and B. Sikdar, Modeling malware propagation in Gnutella type peer-to-peer networks, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium, 2006.
DOI : 10.1109/IPDPS.2006.1639704

C. Schiller and J. Binkley, Botnets : The Killer Web Applications, 2007.

B. Schwartz, A. W. Jackson, W. T. Strayer, W. Zhou, R. D. Rockwell et al., Smart packets: applying active networks to network management, Smart packets : applying active networks to network management, pp.67-88, 2000.
DOI : 10.1145/332799.332893

R. State and O. Festor, Malware: a future framework for device, network and service management, Journal in Computer Virology, vol.1174, issue.1, pp.51-60, 2007.
DOI : 10.1007/s11416-007-0037-1

URL : https://hal.archives-ouvertes.fr/inria-00111987

I. Stoica, R. Morris, D. Karger, F. Kaashoek, and H. Balakrishnan, A Scalable Peer-To- Peer Lookup Service for Internet Applications, Proceedings of the 2001 ACM SIGCOMM Conference, pp.149-160, 2001.

P. Szor, The Art of Computer Virus Research and Defense, 2005.

P. Wang, S. Sparks, and C. C. Zou, « An Advanced Hybrid Peer-to-Peer Botnet », First workshop on Hot Topics in Understanding Botnets (HotBots 07), 2007.