T. Benzel, R. Braden, D. Kim, C. Neuman, A. Joseph et al., Experience with DE- TER: A testbed for security research, Proc. IEEE Conf. on Testbeds and Research Infrastructures for the Dev. of Networks and Communities (TridentCom), 2006.

T. Benzel, R. Braden, D. Kim, C. Neuman, A. Joseph et al., Design, deployment, and use of the DETER testbed, Proc. DETER Community Work. on Cyber Security Experimentation and Test (CSET), 2007.

C. Roehrig and J. Fernandez, The supervision of research projects entailing computer risks within an academic context: the case ofécole of´ofécole Polytechnique de Montréal, Proc. INEER Int. Conf. on Eng. Education and Research, 2009.

G. Bonfante, M. Kaczmarek, and J. Y. Marion, Morphological detection of malware, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE), pp.1-8, 2008.
DOI : 10.1109/MALWARE.2008.4690851

URL : https://hal.archives-ouvertes.fr/inria-00330021

M. Hibler, R. Ricci, L. Stoller, J. Duerig, S. Guruprasad et al., Large-scale virtualization in the Emulab network testbed, Proc. USENIX Ann. Tech. Conf, 2008.

L. Li, P. Liu, Y. Jhi, and G. Kesidis, Evaluation of collaborative worm containments on DETER testbed, Proc. DETER Community Work. on Cyber Security Experimentation and Test (CSET), 2007.

H. Benzamane, Analyse de systèmes de gestion de clusters: Xcat, Emulab, 2009.

J. Calvet, C. Davis, and P. M. Bureau, Malware authors don't learn, and that's good!, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE), 2009.
DOI : 10.1109/MALWARE.2009.5403013

P. M. Bureau and J. Fernandez, Optimising Networks Against Malware, 2007 IEEE International Performance, Computing, and Communications Conference, 2007.
DOI : 10.1109/PCCC.2007.358935

H. Inoue, D. Jansens, A. Hijazi, and A. Somayaji, NetADHICT: A tool for understanding network traffic, Proc. USENIX Large Installation System Administration Conf. (LISA), 2007.