A. Ain, M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, Rank correlation for low-rate ddos attack detection: An empirical evaluation, I. J. Network Security, vol.18, issue.3, pp.474-480, 2016.

E. S. Al-shaer and H. H. Hamed, Discovery of policy anomalies in distributed firewalls, Proceedings of the Twenty-third Annual Joint Conference of the IEEE Computer and Communications, 2004.

T. Ball, N. Bjørner, A. Gember, S. Itzhaky, A. Karbyshev et al., Vericon: Towards Verifying Controller Programs in SoftwareDefined Networks, Proc. 35th ACM SIGPLAN Intl. Conf. Programming Language Design (PLDI'14), pp.282-293, 2014.

D. Barthel, J. Vasseur, K. Pister, M. Kim, and N. Dejean, Routing Metrics Used for Path Calculation in Low-Power and Lossy Networks, RFC, vol.6551, 2012.

,

A. Biere, M. Heule, H. Van-maaren, and T. Walsch, , 2008.

X. Chen and J. Heidemann, Detecting early worm propagation through packet matching, USC/Information Sciences Institute, 2004.

B. Claise, Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of, IP Traffic Flow Information. RFC, vol.5101, 2008.

,

E. M. Clarke, The birth of model checking, 25 Years of Model Checking, vol.5000, pp.1-26, 2008.

R. Ensafi, J. C. Park, D. Kapur, and J. R. Crandall, Idle port scanning and noninterference analysis of network protocol stacks using model checking, Proceedings of the 19th USENIX Conference on Security, pp.17-17, 2010.

V. Forejt, M. Kwiatkowska, G. Norman, and D. Parker, Automated verification techniques for probabilistic systems, Formal Methods for Eternal Networked Software Systems (SFM'11), vol.6659, pp.53-113, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00648037

N. Foster, M. J. Freedman, A. Guha, R. Harrison, N. P. Kata et al., Languages for Software-Defined Networks. In: Software Technology Group, 2016.

N. Foster, M. J. Freedman, R. Harrison, C. Monsanto, and D. Walker, Frenetic, a Network Programming Language, Proceedings of the 16th ACM SIGPLAN International Conference on Functional Programming, 2011.

S. García, M. Grill, J. Stiborek, and A. Zunino, An empirical comparison of botnet detection methods, Comput. Secur, vol.45, pp.100-123, 2014.

M. J. Handley and E. Rescorla, Internet Architecture Board: Internet Denial-ofService Considerations, RFC, vol.4732, 2006.

G. Hurel, R. Badonnel, A. Lahmadi, and O. Festor, Behavioral and Dynamic Security Functions Chaining for Android Devices, Proceedings of the 11th IFIP/IEEE/ACM SIGCOMM International Conference on Network and Service Management (CNSM'15, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01231173

G. Hurel, R. Badonnel, A. Lahmadi, and O. Festor, Towards Cloud Based Compositions of Security Functions for Mobile Devices, IFIP/IEEE International Symposium on Integrated Network Management (IM'15, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01093041

H. Kim, J. Reich, A. Gupta, M. Shahbaz, N. Feamster et al., Kinetic: Verifiable Dynamic Network Control, Proceedings of the 12th USENIX Conference on Networked Systems Design and Implementation (NSDI'15, 2015.

A. Lahmadi, F. Beck, E. Finickel, and O. Festor, A platform for the analysis and visualization of network flow data of android environments
URL : https://hal.archives-ouvertes.fr/hal-01242911

, IFIP/IEEE International Symposium on Integrated Network Management (IM), 2015.

G. S. Malkin and T. L. Parker, Internet Users' Glossary. RFC 1392, 1993.

N. Schnepf, S. Merz, R. Badonnel, and A. Lahmadi, Automated verification of security chains in software-defined networks with Synaptic, Proceedings of the 3rd IEEE Conference on Network Softwarization (NetSoft'17, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01630806

N. Schnepf, S. Merz, R. Badonnel, and A. Lahmadi, Towards generation of SDN policies for protecting android environments based on automata learning, Proceedings of the 16th Network Operations and Management Symposium, 2018.

A. Sperotto, Flow-based intrusion detection, 2010.
URL : https://hal.archives-ouvertes.fr/hal-01529782