Simulating cyber attacks, defences, and consequences, Computers & Security, vol.18, issue.6, pp.479-518, 1999. ,
DOI : 10.1016/S0167-4048(99)80115-1
An intrusion response decision-making model based on hierarchical task network planning, Expert Systems with Applications, vol.37, issue.3, pp.2465-2472, 2010. ,
DOI : 10.1016/j.eswa.2009.07.079
Adaptive Agent-Based Intrusion Response. PhD Dessertation, Texas A&M University, 2001. ,
Informing the decision process in an automated intrusion response system, Information Security Technical Report, vol.10, issue.3, pp.150-161, 2005. ,
DOI : 10.1016/j.istr.2005.07.002
A Cost-Sensitive Model for Preemptive Intrusion Response Systems, 21st International Conference on Advanced Networking and Applications (AINA '07), pp.428-435, 2007. ,
DOI : 10.1109/AINA.2007.9
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.89.2292
ADEPTS: adaptive intrusion response using attack graphs in an e-commerce environment, International Conference on Dependable Systems and Networks (DSN 2005, pp.508-517, 2005. ,
A Risk Index Model for Security Incident Prioritisation, 9th Australian Information Security Management Conference, pp.25-39, 2011. ,
7 Habits of Highly Effective People, 15th Anniversary edition, 2004. ,
DOI : 10.1002/pfi.4170301009
Developing Effective Risk Responses, 30th Annual Project Management Institute 1999 Seminars & Symposium, 1999. ,
An investigation and survey of response options for Intrusion Response Systems (IRSs), 2010 Information Security for South Africa, pp.1-8, 2010. ,
DOI : 10.1109/ISSA.2010.5588654
Common Vulnerability Scoring System, IEEE Security and Privacy Magazine, vol.4, issue.6, pp.85-89, 2006. ,
DOI : 10.1109/MSP.2006.145