Autonomic computer network defence using risk state and reinforcement learning, Cryptology and Information Security Series, vol.3, pp.238-248, 2009. ,
Network Anomaly Detection: Methods, Systems and Tools, IEEE Communications Surveys & Tutorials, vol.16, issue.1, pp.303-336, 2014. ,
DOI : 10.1109/SURV.2013.052213.00046
The role of game theory in information warfare, 4th Information survivability workshop, 2001. ,
A Survey on Software-Defined Network and OpenFlow: From Concept to Implementation, IEEE Communications Surveys & Tutorials, vol.16, issue.4, pp.2181-2206, 2014. ,
DOI : 10.1109/COMST.2014.2326417
Cloud-based testbed for simulation of cyber attacks, Network Operations and Management Symposium (NOMS), 2014 IEEE, pp.1-6, 2014. ,
Software-Defined Networking: A Comprehensive Survey, Proceedings of the IEEE, vol.103, issue.1, pp.14-76, 2015. ,
DOI : 10.1109/JPROC.2014.2371999
URL : http://arxiv.org/pdf/1406.0440
Incentive-based modeling and inference of attacker intent, objectives, and strategies, ACM Transactions on Information and System Security, vol.8, issue.1, pp.78-118, 2005. ,
DOI : 10.1145/1053283.1053288
URL : http://ist.psu.edu/s2/paper/307-liu.pdf
Security information and event management (SIEM) implementation, 2010. ,
Intrusion response systems: survey and taxonomy, Int. J. Comput. Sci. Netw. Secur, vol.12, issue.1, pp.1-14, 2012. ,
KYPO -a platform for cyber defence exercises, STO-MP-MSG-133: M&S Support to Operational Tasks Including War Gaming, Logistics, Cyber Defence. NATO Science and Technology Organization, 2015. ,
RRE: A Game-Theoretic Intrusion Response and Recovery Engine, IEEE Transactions on Parallel and Distributed Systems, vol.25, issue.2, pp.395-406, 2014. ,
DOI : 10.1109/TPDS.2013.211