F. Cohen, Simulating cyber attacks, defences, and consequences, Computers & Security, vol.18, issue.6, pp.479-518, 1999.
DOI : 10.1016/S0167-4048(99)80115-1

C. Mu and Y. Li, An intrusion response decision-making model based on hierarchical task network planning, Expert Systems with Applications, vol.37, issue.3, pp.2465-2472, 2010.
DOI : 10.1016/j.eswa.2009.07.079

C. A. Carver, Adaptive Agent-Based Intrusion Response. PhD Dessertation, Texas A&M University, 2001.

M. Papadaki and S. M. Furnell, Informing the decision process in an automated intrusion response system, Information Security Technical Report, vol.10, issue.3, pp.150-161, 2005.
DOI : 10.1016/j.istr.2005.07.002

N. Stakhanova, S. Basu, and J. Wong, A Cost-Sensitive Model for Preemptive Intrusion Response Systems, 21st International Conference on Advanced Networking and Applications (AINA '07), pp.428-435, 2007.
DOI : 10.1109/AINA.2007.9

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.89.2292

B. Foo, Y. S. Wu, Y. C. Mao, S. Bagchi, and E. Spafford, ADEPTS: adaptive intrusion response using attack graphs in an e-commerce environment, International Conference on Dependable Systems and Networks (DSN 2005, pp.508-517, 2005.

N. B. Anuar, S. Furnell, M. Papadaki, C. , and N. , A Risk Index Model for Security Incident Prioritisation, 9th Australian Information Security Management Conference, pp.25-39, 2011.

S. R. Covey, 7 Habits of Highly Effective People, 15th Anniversary edition, 2004.
DOI : 10.1002/pfi.4170301009

D. Hillson, Developing Effective Risk Responses, 30th Annual Project Management Institute 1999 Seminars & Symposium, 1999.

N. B. Anuar, M. Papadaki, S. Furnell, C. , and N. , An investigation and survey of response options for Intrusion Response Systems (IRSs), 2010 Information Security for South Africa, pp.1-8, 2010.
DOI : 10.1109/ISSA.2010.5588654

P. Mell, K. Scarfone, R. , and S. , Common Vulnerability Scoring System, IEEE Security and Privacy Magazine, vol.4, issue.6, pp.85-89, 2006.
DOI : 10.1109/MSP.2006.145