J. Almasizadeh and M. A. Azgomi, Intrusion Process Modeling for Security Quantification, 2009 International Conference on Availability, Reliability and Security, pp.114-121, 2009.
DOI : 10.1109/ARES.2009.142

E. Jonsson and T. Olovsson, A quantitative model of the security intrusion process based on attacker behavior, IEEE Transactions on Software Engineering, vol.23, issue.4, pp.235-245, 1997.
DOI : 10.1109/32.588541

B. B. Madan, K. Goseva-popstojanova, K. Vaidyanathan, and K. S. Trivedi, Modeling and quantification of security attributes of software systems, Proceedings International Conference on Dependable Systems and Networks, pp.505-514, 2002.
DOI : 10.1109/DSN.2002.1028941

M. A. Mcqueen, W. F. Boyer, M. A. Flynn, and G. A. Beitel, Time-to-Compromise Model for Cyber Risk Reduction Estimation, First Workshop on Quality of Protection, pp.49-64, 2005.
DOI : 10.1007/978-0-387-36584-8_5

M. A. Mcqueen, W. F. Boyer, M. A. Flynn, and G. Beitel, Quantitative Cyber Risk Reduction Estimation Methodology for a Small SCADA Control System, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06), 2006.
DOI : 10.1109/HICSS.2006.405

R. Ortalo, Y. Deswarte, and M. Kaaniche, Experimenting with quantitative evaluation tools for monitoring operational security, IEEE Transactions on Software Engineering, vol.25, issue.5, pp.633-650, 1999.
DOI : 10.1109/32.815323

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.44.3072

S. A. Alsuhibany, Optimising CAPTCHA Generation, 2011 Sixth International Conference on Availability, Reliability and Security, pp.740-745, 2011.
DOI : 10.1109/ARES.2011.114

K. Sallhammar, S. J. Knapskog, and B. E. Helvik, Using Stochastic Game Theory to Compute the Expected Behavior of Attackers, 2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops), 2005.
DOI : 10.1109/SAINTW.2005.1619988

K. Yoshida, F. Adachi, T. Washio, H. Motoda, T. Homma et al., Density-based spam detector, Proceedings of the 2004 ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '04, pp.486-493, 2004.
DOI : 10.1145/1014052.1014107

S. A. Alsuhibany, A. Alonizi, C. Morisset, and A. Van-moorsel, Optimizing the Release Order of Defensive Mechanisms, 29 th Annual UK Performance Engineering Workshop

J. Mcinerney, S. Tubberud, S. Anwar, and . S. Hamilton, FRIARS: a Feedback Control System for Information Assurance Using a Markov Decision Process, 35th Annual 2001 International Carnahan Conference on Security Technology, pp.223-228, 2001.

T. Alpcan and T. Baser, An Intrusion Detection Game with Limited Observations, 12th International Symposium on Dynamic Games and Applications. France, 2006.

S. Shiva, S. Roy, and D. Dasgupta, Game theory for cyber security, Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, CSIIRW '10, 2010.
DOI : 10.1145/1852666.1852704

D. Leversage and E. J. Byres, Comparing Electronic Battlefields: Using Mean Time-To-Compromise as a Comparative Security Metric, 4th Int'l Conf. Mathematical Methods, Models, and Architectures for Computer Network Security, pp.213-227, 2007.
DOI : 10.1007/978-3-540-73986-9_18

R. Elio and J. R. Anderson, The effects of information order and learning mode on schema abstraction, Memory & Cognition, vol.12, issue.1, pp.20-30, 1984.
DOI : 10.3758/BF03196994

C. M. Sandhofer and L. A. Doumas, Order of Presentation Effects in Learning Color Categories, Journal of Cognition and Development, vol.1, issue.2, pp.194-221, 2008.
DOI : 10.1006/jmla.1998.2566

D. L. Medin and J. G. Bettger, Presentation order and recognition of categorically related examples, Psychonomic Bulletin & Review, vol.13, issue.2, pp.250-254, 1994.
DOI : 10.3758/BF03200776

W. Jiang, Z. Tian, H. Zhang, and X. Song, A Stochastic Game Theoretic Approach to Attack Prediction and Optimal Active Defense Strategy Decision, 2008 IEEE International Conference on Networking, Sensing and Control, pp.6-8, 2008.
DOI : 10.1109/ICNSC.2008.4525297

L. Huang, A. D. Joseph, B. Nelson, B. I. Rubinstein, and J. D. Tygar, Adversarial machine learning, Proceedings of the 4th ACM workshop on Security and artificial intelligence, AISec '11, pp.43-58, 2011.
DOI : 10.1145/2046684.2046692

F. Mathy and J. Feldman, A rule-based presentation order facilitates category learning, Psychonomic Bulletin & Review, vol.50, issue.6, pp.1050-1057, 2009.
DOI : 10.3758/PBR.16.6.1050

URL : https://hal.archives-ouvertes.fr/hal-01358907

S. A. Alsuhibany and A. Van-moorsel, Modelling and Analysis of Release Order of Security Algorithms Using Stochastic Petri Nets, 2013 International Conference on Availability, Reliability and Security
DOI : 10.1109/ARES.2013.58

M. Caliendo, M. Clement, D. Papies, and S. Scheel-kopeinig, ???The Cost Impact of Spam Filters: Measuring the Effect of Information System Technologies in Organizations, Information Systems Research, vol.23, issue.3-part-2, pp.1-13, 2012.
DOI : 10.1287/isre.1110.0396

P. Kahn and K. O-'rourke, Guide to Curriculum Design: Enquiry-Based Learning. Higher Education Academy, 2004.

F. Garcia, J. Hoepman, and J. Van-nieuwenhuizen, Spam Filter Analysis, 19th IFIP International Information Security Conference, pp.395-410, 2004.
DOI : 10.1007/1-4020-8143-X_26

S. Roy, C. Ellis, S. Shiva, D. Dasgupta, V. Shandilya et al., A Survey of Game Theory as Applied to Network Security, 2010 43rd Hawaii International Conference on System Sciences, pp.1-10, 2010.
DOI : 10.1109/HICSS.2010.35