L. Zhang, Named data networking, ACM SIGCOMM Computer Communication Review, vol.44, issue.3, pp.66-73, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01182997

R. Tourani, Security, privacy, and access control in informationcentric networking: A survey, IEEE Communications Surveys & Tutorials, 2017.

T. Nguyen, R. Cogranne, and G. Doyen, An optimal statistical test for robust detection against interest flooding attacks in ccn, IFIP/IEEE IM, pp.252-260, 2015.
URL : https://hal.archives-ouvertes.fr/hal-02272229

T. N. Nguyen, Detection of Interest flooding attacks in named data networking using hypothesis testing, IEEE WIFS, pp.1-6, 2015.
URL : https://hal.archives-ouvertes.fr/hal-02272998

H. L. Mai, On the Readiness of NDN for a Secure Deployment: The Case of Pending Interest Table, IFIP AIMS, pp.98-110, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01632732

T. Nguyen, Content Poisoning in Named Data Networking: Comprehensive characterization of real deployment, IFIP/IEEE IM, pp.72-80, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01652328

H. L. Mai, Towards a Security Monitoring Plane for Named Data Networking and its Application against Content Poisoning Attack, 2018.
URL : https://hal.archives-ouvertes.fr/hal-02274867

B. Ahlgren, A survey of information-centric networking, IEEE Communications Magazine, vol.50, issue.7, pp.26-36, 2012.

A. Afanasyev, Interest flooding attack and countermeasures in Named Data Networking, IFIP Networking Conference, pp.1-9, 2013.

A. Compagno, Poseidon: Mitigating interest flooding DDoS attacks in named data networking, IEEE LCN, pp.630-638, 2013.

K. Wang, Detecting and mitigating interest flooding attacks in content-centric network, Security and Communication Networks, vol.7, pp.685-699, 2014.

S. Dibenedetto and C. Papadopoulos, Mitigating Poisoned Content with Forwarding Strategy, INFOCOM WKSHPS, pp.164-169, 2016.

C. Ghali, G. Tsudik, and E. Uzun, Needle in a Haystack: Mitigating Content Poisoning in Named-Data Networking, NDSS Workshop SENT, 2014.

D. Kim, S. Nam, J. Bi, and I. Yeom, Efficient Content Verification in Named Data Networking, ACM ICN, pp.109-116, 2015.

C. Yi, Adaptive forwarding in named data networking, ACM SIGCOMM computer communication review, vol.42, issue.3, pp.62-67, 2012.