S. Kaisler, F. Armour, J. A. Espinosa, and W. Money, Big data: Issues and challenges moving forward, System Sciences (HICSS), 2013 46th Hawaii International Conference on, pp.995-1004, 2013.

J. Dartois, A. Knefati, J. Boukhobza, and O. Barais, Using quantile regression for reclaiming unused cloud resources while achieving sla, 2018 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), pp.89-98, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01898438

D. P. Anderson, J. Cobb, E. Korpela, M. Lebofsky, and D. Werthimer, Seti@ home: an experiment in publicresource computing, Communications of the ACM, vol.45, issue.11, pp.56-61, 2002.

M. J. Litzkow, M. Livny, and M. W. Mutka, Condor-a hunter of idle workstations, 1987.

S. Sidiroglou-douskos, S. Misailovic, H. Hoffmann, and M. Rinard, Managing performance vs. accuracy trade-offs with loop perforation, Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on Foundations of software engineering, pp.124-134, 2011.

S. Arnautov, B. Trach, F. Gregor, T. Knauth, A. Martin et al.,

D. Stillwell, D. Goltzsche, R. Eyers, P. Kapitza, C. Pietzuch et al., SCONE: Secure linux containers with intel SGX, 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16), pp.689-703, 2016.

L. F. Sarmenta, Sabotage-tolerance mechanisms for volunteer computing systems, Future Generation Computer Systems, vol.18, issue.4, pp.561-572, 2002.

, cadvisor online documentation, Website, 2019.

G. Aceto, A. Botta, W. D. Donato, and A. Pescapè, Cloud monitoring: A survey, Computer Networks, vol.57, issue.9, pp.2093-2115, 2013.

E. Alpaydin, Introduction to machine learning, 2014.

J. Dartois, H. B. Ribeiro, J. Boukhobza, and O. Barais, Cuckoo: a mechanism for exploiting ephemeral and heterogeneous cloud resource, IEEE International Conference on Cloud Computing, 2019.

W. Reese, Nginx: the high-performance web server and reverse proxy, Linux Journal, vol.2008, issue.173, 2008.

A. Mysql, Mysql, 2001.

A. Brazell and W. Bible, , vol.726, 2011.

V. Tarasov, E. Zadok, and S. Shepler, Filebench: A flexible framework for file system benchmarking, The USENIX Magazine, vol.41, issue.1, 2016.

F. Bellard and M. Niedermayer, Ffmpeg, 2012.

R. M. Stallman, Using the gnu compiler collection, Free Software Foundation, vol.4, issue.02, 2003.

M. Feurer, A. Klein, K. Eggensperger, J. Springenberg, M. Blum et al., Efficient and robust automated machine learning, Advances in Neural Information Processing Systems, pp.2962-2970, 2015.

L. Breiman, Random forests, Machine learning, vol.45, issue.1, pp.5-32, 2001.

A. Jain and D. Zongker, Feature selection: Evaluation, application, and small sample performance, IEEE transactions on pattern analysis and machine intelligence, vol.19, pp.153-158, 1997.

G. Chandrashekar and F. Sahin, A survey on feature selection methods, Computers & Electrical Engineering, vol.40, issue.1, pp.16-28, 2014.

H. Hao, C. Liu, and H. Sako, Comparison of genetic algorithm and sequential search methods for classifier subset selection, Seventh International Conference on Document Analysis and Recognition, pp.765-769, 2003.

J. Yang and V. Honavar, Feature subset selection using a genetic algorithm, pp.117-136, 1998.

F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion et al., Scikit-learn: Machine learning in python, Journal of machine learning research, vol.12, pp.2825-2830, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00650905

T. H. Friedman, The Elements of Statistical Learning, Springer Series in Statistics, 2013.

S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-peleg, Proofs of ownership in remote storage systems, Proceedings of the 18th ACM conference on Computer and communications security, pp.491-500, 2011.

R. Karedla, J. S. Love, and B. G. Wherry, Caching strategies to improve disk system performance, Computer, vol.27, issue.3, pp.38-46, 1994.

J. Dartois, J. Boukhobza, A. Knefati, and O. Barais, Investigating machine learning algorithms for modeling ssd i/o performance for container-based virtualization, IEEE Transactions on Cloud Computing, vol.14, pp.1-14, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02013421

W. Du, M. Murugesan, and J. Jia, Uncheatable grid computing, Algorithms and theory of computation handbook, pp.30-30, 2010.

S. Zhao, V. Lo, and C. G. Dickey, Result verification and trust-based scheduling in peer-to-peer grids," in Peer-toPeer Computing, Fifth IEEE International Conference on, pp.31-38, 2005.

P. Golle and I. Mironov, Uncheatable distributed computations, Topics in CryptologyCT-RSA, pp.425-440, 2001.

D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, and B. Sunar, Trojan detection using ic fingerprinting, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.296-310, 2007.

Y. Jin and Y. Makris, Hardware trojan detection using path delay fingerprint, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust, pp.51-57, 2008.

Y. Lin, C. Lu, Y. Lai, W. Peng, and P. Lin, Application classification using packet size distribution and port association, Journal of Network and Computer Applications, vol.32, issue.5, pp.1023-1030, 2009.

B. Gulmezoglu, T. Eisenbarth, and B. Sunar, Cache-based application detection in the cloud using machine learning, Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, vol.17, pp.288-300, 2017.

S. Zander, T. Nguyen, and G. Armitage, Automated traffic classification and application identification using machine learning, The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l, pp.250-257, 2005.

R. Schuster, V. Shmatikov, and E. Tromer, Beauty and the burst: Remote identification of encrypted video streams, 26th USENIX Security Symposium (USENIX Security 17), pp.1357-1374, 2017.