L. Beaudoin, N. Japkowicz, and S. Matwin, Autonomic computer network defence using risk state and reinforcement learning, Cryptology and Information Security Series, vol.3, pp.238-248, 2009.

M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, Network Anomaly Detection: Methods, Systems and Tools, IEEE Communications Surveys & Tutorials, vol.16, issue.1, pp.303-336, 2014.
DOI : 10.1109/SURV.2013.052213.00046

S. N. Hamilton, W. L. Miller, A. Ott, and O. S. Saydjari, The role of game theory in information warfare, 4th Information survivability workshop, 2001.

F. Hu, Q. Hao, and K. Bao, A Survey on Software-Defined Network and OpenFlow: From Concept to Implementation, IEEE Communications Surveys & Tutorials, vol.16, issue.4, pp.2181-2206, 2014.
DOI : 10.1109/COMST.2014.2326417

D. Kou?il, T. Rebok, T. Jirsík, J. ?egan, M. Dra?ar et al., Cloud-based testbed for simulation of cyber attacks, Network Operations and Management Symposium (NOMS), 2014 IEEE, pp.1-6, 2014.

D. Kreutz, F. Ramos, E. Verissimo, P. Esteve-rothenberg, C. Azodolmolky et al., Software-Defined Networking: A Comprehensive Survey, Proceedings of the IEEE, vol.103, issue.1, pp.14-76, 2015.
DOI : 10.1109/JPROC.2014.2371999

URL : http://arxiv.org/pdf/1406.0440

P. Liu, W. Zang, and M. Yu, Incentive-based modeling and inference of attacker intent, objectives, and strategies, ACM Transactions on Information and System Security, vol.8, issue.1, pp.78-118, 2005.
DOI : 10.1145/1053283.1053288

URL : http://ist.psu.edu/s2/paper/307-liu.pdf

D. Miller, S. Harris, A. Harper, S. Vandyke, and C. Blask, Security information and event management (SIEM) implementation, 2010.

A. Shameli-sendi, N. Ezzati-jivan, M. Jabbarifar, and M. Dagenais, Intrusion response systems: survey and taxonomy, Int. J. Comput. Sci. Netw. Secur, vol.12, issue.1, pp.1-14, 2012.

P. ?eleda, J. ?egan, J. Vykopal, and D. Tovar?ák, KYPO -a platform for cyber defence exercises, STO-MP-MSG-133: M&S Support to Operational Tasks Including War Gaming, Logistics, Cyber Defence. NATO Science and Technology Organization, 2015.

S. Zonouz, H. Khurana, W. H. Sanders, and T. M. Yardley, RRE: A Game-Theoretic Intrusion Response and Recovery Engine, IEEE Transactions on Parallel and Distributed Systems, vol.25, issue.2, pp.395-406, 2014.
DOI : 10.1109/TPDS.2013.211