S. Massimiliano-albanese, S. Jajodia, and . Noel, Time-efficient and cost-effective network hardening using attack graphs, Dependable Systems and Networks (DSN), 2012 42nd Annual IEEE/IFIP International Conference on, pp.1-12, 2012.

P. Ammann, D. Wijesekera, and S. Kaushik, Scalable, graph-based network vulnerability analysis, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.217-224, 2002.
DOI : 10.1145/586110.586140

A. Avizienis and L. Chen, On the implementation of n-version programming for software fault tolerance during execution, Proc. IEEE COMPSAC, pp.149-155, 1977.

H. Md-azamathulla, . Fu-chun, A. A. Wu, . Ghani, M. Sandeep et al., Comparison between genetic algorithm and linear programming approach for real time operation, Journal of Hydro-environment Research, vol.2, issue.3, pp.172-181, 2008.
DOI : 10.1016/j.jher.2008.10.001

K. Bakshi, Cisco cloud computing-data center strategy, architecture, and solutions. CISCO White Paper, 2009.

D. Borbor, L. Wang, S. Jajodia, and A. Singhal, Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks, IFIP Annual Conference on Data and Applications Security and Privacy, pp.295-312, 2016.
DOI : 10.1109/TIFS.2016.2516916

URL : https://hal.archives-ouvertes.fr/hal-01633677

B. Cox, D. Evans, A. Filipi, J. Rowanhill, W. Hu et al., N-variant systems: a secretless framework for security through diversity, Usenix Security, pp.105-120, 2006.

K. Deb, An efficient constraint handling method for genetic algorithms Computer methods in applied mechanics and engineering, pp.311-338, 2000.

R. Dewri, N. Poolsappasit, I. Ray, and D. Whitley, Optimal security hardening using multi-objective optimization on attack tree models of networks, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.204-213, 2007.
DOI : 10.1145/1315245.1315272

R. Dewri, I. Ray, N. Poolsappasit, and D. Whitley, Optimal security hardening on attack tree models of networks: a cost-benefit analysis, International Journal of Information Security, vol.6, issue.5, pp.167-188, 2012.
DOI : 10.1109/TEVC.2002.800880

T. Fifield, D. Fleming, A. Gentle, L. Hochstein, J. Proulx et al., OpenStack Operations Guide, p.2014

D. Gao, K. Michael, D. Reiter, and . Song, Behavioral Distance Measurement Using Hidden Markov Models, Recent Advances in Intrusion Detection, pp.19-40, 2006.
DOI : 10.1007/11856214_2

URL : http://repository.cmu.edu/cgi/viewcontent.cgi?article=1023&context=ece

M. Garcia, A. Bessani, I. Gashi, N. Neves, and R. Obelheiro, OS diversity for intrusion tolerance: Myth or reality?, 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN), pp.383-394, 2011.
DOI : 10.1109/DSN.2011.5958251

URL : http://www.di.fc.ul.pt/%7Enuno/PAPERS/DSN11.pdf

M. Gupta, J. Rees, A. Chaturvedi, and J. Chi, Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach, Decision Support Systems, vol.41, issue.3, pp.592-603, 2006.
DOI : 10.1016/j.dss.2004.06.004

S. Jajodia, S. Noel, and B. O. Berry, Topological analysis of network attack vulnerability, Managing Cyber Threats: Issues, Approaches and Challenges, 2003.
DOI : 10.1145/1229285.1229288

B. Krebs, How many zero-days hit you today? http://krebsonsecurity.com, 2013.

J. Mchugh, Quality of protection, Proceedings of the 2nd ACM workshop on Quality of protection , QoP '06, pp.1-2, 2006.
DOI : 10.1145/1179494.1179495

P. Mell, K. Scarfone, and S. Romanosky, Common Vulnerability Scoring System, IEEE Security and Privacy Magazine, vol.4, issue.6, pp.85-89, 2006.
DOI : 10.1109/MSP.2006.145

L. Mieritz and B. Kirwin, Defining gartner total cost of ownership, L. Mieritz, B. Kirwin, 2005.

N. Poolsappasit, R. Dewri, and I. Ray, Dynamic security risk management using bayesian attack graphs. Dependable and Secure Computing, IEEE Transactions on, vol.9, issue.1, pp.61-74, 2012.
DOI : 10.1109/tdsc.2011.34

I. Ray and N. Poolsapassit, Using Attack Trees to Identify Malicious Attacks from Authorized Insiders, ESORICS 2005, pp.231-246, 2005.
DOI : 10.1007/11555827_14

O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. M. Wing, Automated generation and analysis of attack graphs, Proceedings 2002 IEEE Symposium on Security and Privacy, pp.273-284, 2002.
DOI : 10.1109/SECPRI.2002.1004377

L. Wang, M. Albanese, and S. Jajodia, Network Hardening: An Automated Approach to Improving Network Security, 2014.
DOI : 10.1007/978-3-319-04612-9

L. Wang, S. Jajodia, A. Singhal, P. Cheng, and S. Noel, k-zero day safety: A network security metric for measuring the risk of unknown vulnerabilities. Dependable and Secure Computing, IEEE Transactions on, vol.11, issue.1, pp.30-44, 2014.

L. Wang, S. Jajodia, A. Singhal, and S. Noel, k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks, ESORICS 2010, pp.573-587, 2010.
DOI : 10.1007/978-3-642-15497-3_35

L. Wang, S. Noel, and S. Jajodia, Minimum-cost network hardening using attack graphs, Computer Communications, vol.29, issue.18, pp.3812-3824, 2006.
DOI : 10.1016/j.comcom.2006.06.018

L. Wang, A. Singhal, and S. Jajodia, Measuring the Overall Security of Network Configurations Using Attack Graphs, Data and Applications Security XXI, pp.98-112, 2007.
DOI : 10.1007/11805588_9

L. Wang, M. Zhang, S. Jajodia, A. Singhal, and M. Albanese, Modeling network diversity for evaluating the robustness of networks against zeroday attacks, ESORICS 2014, pp.494-511, 2014.

S. Wang, Z. Zhang, and Y. Kadobayashi, Exploring attack graph for costbenefit security hardening: A probabilistic approach. Computers & security, pp.158-169, 2013.
DOI : 10.1016/j.cose.2012.09.013

B. Yigit, G. Gur, and F. Alagoz, Cost-Aware Network Hardening with Limited Budget Using Compact Attack Graphs, 2014 IEEE Military Communications Conference, pp.152-157, 2014.
DOI : 10.1109/MILCOM.2014.31

M. Zhang, L. Wang, S. Jajodia, A. Singhal, and M. Albanese, Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks, IEEE Transactions on Information Forensics and Security, vol.11, issue.5, pp.1071-1086, 2016.
DOI : 10.1109/TIFS.2016.2516916