F. Alomari and D. A. Menascé, An Autonomic Framework for Integrating Security and Quality of Service Support in Databases, 2012 IEEE Sixth International Conference on Software Security and Reliability, pp.51-60, 2012.
DOI : 10.1109/SERE.2012.15

S. W. Boyd and A. D. Keromytis, SQLrand: Preventing SQL Injection Attacks, Proceedings of the 2nd International Conference on Applied Cryptography and Network Security, pp.292-302, 2004.
DOI : 10.1007/978-3-540-24852-1_21

URL : http://www1.cs.columbia.edu/~angelos/Papers/sqlrand.pdf

T. E. Carroll, M. Crouse, E. W. Fulp, and K. S. Berenhaut, Analysis of network address shuffling as a moving target defense, 2014 IEEE International Conference on Communications (ICC), pp.701-706, 2014.
DOI : 10.1109/ICC.2014.6883401

S. G. Chen, Reduced Recursive Inclusion-exclusion Principle for the probability of union events, 2014 IEEE International Conference on Industrial Engineering and Engineering Management, pp.11-13, 2014.
DOI : 10.1109/IEEM.2014.7058590

K. A. Farris and G. Cybenko, Quantification of moving target cyber defenses, Proceedings of SPIE Defense + Security 2015, 2015.
DOI : 10.1117/12.2182176

M. Howard and D. Leblanc, Writing Secure Code, 2002.

J. H. Jafarian and E. A. Amd-qi-duan, Spatio-temporal Address Mutation for Proactive Cyber Agility against Sophisticated Attackers, Proceedings of the First ACM Workshop on Moving Target Defense, MTD '14, pp.69-78, 2014.
DOI : 10.1109/PADS.2005.24

S. Jajodia, A. K. Ghosh, V. Swarup, and C. Wang, Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, Advances in Information Security, 2011.
DOI : 10.1007/978-1-4614-0977-9

S. Jajodia, S. Noel, and B. O-'berry, Managing Cyber Threats: Issues, Approaches, and Challenges, Massive Computing Topological Analysis of Network Attack Vulnerability, pp.247-266, 2005.

L. S. Lasdon, R. L. Fox, and M. W. Ratner, Nonlinear optimization using the generalized reduced gradient method, Revue fran??aise d'automatique, informatique, recherche op??rationnelle. Recherche op??rationnelle, vol.8, issue.V3, pp.73-103, 1974.
DOI : 10.1051/ro/197408V300731

H. Okhravi, M. A. Rabe, T. J. Mayberry, W. G. Leonard, T. R. Hobson et al., Survey of cyber moving targets, 2013.

H. Shacham, M. Page, B. Pfaff, E. J. Go, N. Modadugu et al., On the effectiveness of address-space randomization, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.298-307, 2004.
DOI : 10.1145/1030083.1030124

N. Soule, B. Simidchieva, F. Yaman, R. Watro, J. Loyall et al., Quantifying & minimizing attack surfaces containing moving target defenses, 2015 Resilience Week (RWS), 2015.
DOI : 10.1109/RWEEK.2015.7287449

L. Wang, T. Islam, T. Long, A. Singhal, and S. Jajodia, An Attack Graph-Based Probabilistic Security Metric, Proceedings of the 22nd IFIP Annual Conference on Data and Applications Security and Privacy, pp.283-296, 2008.
DOI : 10.1007/11805588_9

URL : http://people.cis.ksu.edu/~halmohri/files/An Attack Graph-Based Probabilistic Security Metric.pdf

K. Zaffarano, J. Taylor, and S. Hamilton, A Quantitative Framework for Moving Target Defense Effectiveness Evaluation, Proceedings of the Second ACM Workshop on Moving Target Defense, MTD '15, pp.3-10, 2015.
DOI : 10.1145/2663474.2663481