N. Feamster and H. Kim, Software-Defined Networks: Improving Network Management with SDN, IEEE Communications Magazine, 2013.

G. Hurel, R. Badonnel, A. Lahmadi, and O. Festor, Towards Cloud Based Compositions of Security Functions for Mobile Devices, IFIP/IEEE International Symposium on Integrated Network Management (IM'15), 2015.
DOI : 10.1109/inm.2015.7140340

URL : https://hal.archives-ouvertes.fr/hal-01093041

E. Al-shaer and S. Al-haj, FlowChecker, Configuration Analysis and Verification of Federated OpenFlow Infrastructures, Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration (CCS'10), 2010.

T. Ball, N. Bjørner, A. Gember, S. Itzhaky, A. Karbyshev et al., Vericon: Towards Verifying Controller Programs in Software-Defined Networks, Proc. 35th ACM SIGPLAN Intl. Conf. Programming Language Design (PLDI'14), pp.282-293, 2014.

N. Foster, M. J. Freedman, A. Guha, R. Harrison, N. P. Kata et al., Languages for Software-Defined Networks, 2016.
DOI : 10.1109/mcom.2013.6461197

URL : http://www.cs.princeton.edu/~mfreed/docs/frenetic-ieeecomm13.pdf

N. Foster, M. J. Freedman, R. Harrison, C. Monsanto, and D. Walker, Frenetic, a Network Programming Language, Proceedings of the 16th ACM SIGPLAN International Conference on Functional Programming (ICFP'11), 2011.

H. Kim, J. Reich, A. Gupta, M. Shahbaz, N. Feamster et al., Kinetic: Verifiable Dynamic Network Control, Proceedings of the 12th USENIX Conference on Networked Systems Design and Implementation (NSDI'15), 2015.
DOI : 10.1002/sec.1317

N. Schnepf, S. Merz, R. Badonnel, and A. Lahmadi, Automated verification of security chains in software-defined networks with Synaptic, Proceedings of the 3rd IEEE Conference on Network Softwarization (NetSoft'17, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01630806

C. Barrett, C. L. Conway, M. Deters, L. Hadarean, D. Jovanovic et al., CVC4, Proc. 23rd Intl. Conf. Computer Aided Verification, pp.171-177, 2011.
DOI : 10.1007/978-3-642-22110-1_14

URL : https://link.springer.com/content/pdf/10.1007%2F978-3-642-22110-1_14.pdf

T. Bouton, D. C. Oliveira, D. Déharbe, and P. Fontaine, veriT: An Open, Trustable and Efficient SMT-Solver, Proc. 22nd International Conference on Automated Deduction (CADE-22), pp.151-156, 2009.
DOI : 10.1007/978-3-642-02959-2_12

URL : https://hal.archives-ouvertes.fr/inria-00430634

R. Cavada, A. Cimatti, M. Dorigatti, A. Griggio, A. Mariotti et al., The nuXmv symbolic model checker, Proc. 26th Intl. Conf. Computer Aided Verification (CAV 2014), pp.334-342, 2014.
DOI : 10.1007/978-3-319-08867-9_22

URL : https://link.springer.com/content/pdf/10.1007%2F978-3-319-08867-9_22.pdf

N. Schnepf, S. Merz, R. Badonnel, and A. Lahmadi, Towards generation of sdn policies for protecting android environments based on automata learning, Proceedings of the 16th Network Operations and Management Symposium (IEEE/IFIP NOMS'18), 2018.

A. Lahmadi, F. Beck, E. Finickel, and O. Festor, A platform for the analysis and visualization of network flow data of android environments, IFIP/IEEE International Symposium on Integrated Network Management (IM), 2015.
URL : https://hal.archives-ouvertes.fr/hal-01242911