S. Axelsson, The base-rate fallacy and the difficulty of intrusion detection, ACM Transactions on Information and System Security (TISSEC), vol.3, issue.3, pp.186-205, 2000.

P. Bajan, C. Kiennert, and H. Debar, A new approach of network simulation for data generation in evaluating security products, Internet Monitoring and Protection, 2018. ICIMP 2018. Thirteenth International Conference on. IARIA, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01901017

C. Cowan, S. Arnold, S. Beattie, C. Wright, and J. Viega, Defcon capture the flag: Defending vulnerable code from intense attack, DARPA Information Survivability Conference and Exposition, vol.1, pp.120-129, 2003.

R. K. Cunningham, R. P. Lippmann, D. J. Fried, S. L. Garfinkel, I. Graf et al., Evaluating intrusion detection systems without attacking your friends: The 1998 darpa intrusion detection evaluation, 1999.

R. Fontugne, P. Borgnat, P. Abry, and K. Fukuda, Mawilab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking, Proceedings of the 6th International COnference, p.8, 2010.
URL : https://hal.archives-ouvertes.fr/ensl-00552071

J. Garcia-alfaro, F. Cuppens, N. Cuppens-boulahia, and S. Preda, Mirage: a management tool for the analysis and deployment of network security policies, Data Privacy Management and Autonomous Spontaneous Security, pp.203-215, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00623634

M. Gogolla and F. Hilken, Model validation and verification options in a contemporary uml and ocl analysis tool, 2016.

P. Mell, V. Hu, R. Lippmann, J. Haines, and M. Zissman, An overview of issues in testing intrusion detection systems, 2003.

D. Migault, C. Girard, L. , and M. , A performance view on dnssec migration, Network and Service Management (CNSM), 2010 International Conference on, pp.469-474, 2010.
URL : https://hal.archives-ouvertes.fr/hal-01308335

E. M. Nahum, J. Tracey, and C. P. Wright, Evaluating sip server performance, ACM SIGMETRICS Performance Evaluation Review, vol.35, pp.349-350, 2007.

T. V. Phan, N. K. Bao, and M. Park, Distributedsom: A novel performance bottleneck handler for large-sized software-defined networks under flooding attacks, Journal of Network and Computer Applications, vol.91, pp.14-25, 2017.

J. E. Smith and R. Nair, The architecture of virtual machines, Computer, vol.38, issue.5, pp.32-38, 2005.