Time-efficient and cost-effective network hardening using attack graphs, Dependable Systems and Networks (DSN), 2012 42nd Annual IEEE/IFIP International Conference on, pp.1-12, 2012. ,
Scalable, graph-based network vulnerability analysis, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.217-224, 2002. ,
DOI : 10.1145/586110.586140
On the implementation of n-version programming for software fault tolerance during execution, Proc. IEEE COMPSAC, pp.149-155, 1977. ,
Comparison between genetic algorithm and linear programming approach for real time operation, Journal of Hydro-environment Research, vol.2, issue.3, pp.172-181, 2008. ,
DOI : 10.1016/j.jher.2008.10.001
Cisco cloud computing-data center strategy, architecture, and solutions. CISCO White Paper, 2009. ,
Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks, IFIP Annual Conference on Data and Applications Security and Privacy, pp.295-312, 2016. ,
DOI : 10.1109/TIFS.2016.2516916
URL : https://hal.archives-ouvertes.fr/hal-01633677
N-variant systems: a secretless framework for security through diversity, Usenix Security, pp.105-120, 2006. ,
An efficient constraint handling method for genetic algorithms Computer methods in applied mechanics and engineering, pp.311-338, 2000. ,
Optimal security hardening using multi-objective optimization on attack tree models of networks, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.204-213, 2007. ,
DOI : 10.1145/1315245.1315272
Optimal security hardening on attack tree models of networks: a cost-benefit analysis, International Journal of Information Security, vol.6, issue.5, pp.167-188, 2012. ,
DOI : 10.1109/TEVC.2002.800880
OpenStack Operations Guide, p.2014 ,
Behavioral Distance Measurement Using Hidden Markov Models, Recent Advances in Intrusion Detection, pp.19-40, 2006. ,
DOI : 10.1007/11856214_2
URL : http://repository.cmu.edu/cgi/viewcontent.cgi?article=1023&context=ece
OS diversity for intrusion tolerance: Myth or reality?, 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN), pp.383-394, 2011. ,
DOI : 10.1109/DSN.2011.5958251
URL : http://www.di.fc.ul.pt/%7Enuno/PAPERS/DSN11.pdf
Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach, Decision Support Systems, vol.41, issue.3, pp.592-603, 2006. ,
DOI : 10.1016/j.dss.2004.06.004
Topological analysis of network attack vulnerability, Managing Cyber Threats: Issues, Approaches and Challenges, 2003. ,
DOI : 10.1145/1229285.1229288
How many zero-days hit you today? http://krebsonsecurity.com, 2013. ,
Quality of protection, Proceedings of the 2nd ACM workshop on Quality of protection , QoP '06, pp.1-2, 2006. ,
DOI : 10.1145/1179494.1179495
Common Vulnerability Scoring System, IEEE Security and Privacy Magazine, vol.4, issue.6, pp.85-89, 2006. ,
DOI : 10.1109/MSP.2006.145
Defining gartner total cost of ownership, L. Mieritz, B. Kirwin, 2005. ,
Dynamic security risk management using bayesian attack graphs. Dependable and Secure Computing, IEEE Transactions on, vol.9, issue.1, pp.61-74, 2012. ,
DOI : 10.1109/tdsc.2011.34
Using Attack Trees to Identify Malicious Attacks from Authorized Insiders, ESORICS 2005, pp.231-246, 2005. ,
DOI : 10.1007/11555827_14
Automated generation and analysis of attack graphs, Proceedings 2002 IEEE Symposium on Security and Privacy, pp.273-284, 2002. ,
DOI : 10.1109/SECPRI.2002.1004377
Network Hardening: An Automated Approach to Improving Network Security, 2014. ,
DOI : 10.1007/978-3-319-04612-9
k-zero day safety: A network security metric for measuring the risk of unknown vulnerabilities. Dependable and Secure Computing, IEEE Transactions on, vol.11, issue.1, pp.30-44, 2014. ,
k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks, ESORICS 2010, pp.573-587, 2010. ,
DOI : 10.1007/978-3-642-15497-3_35
Minimum-cost network hardening using attack graphs, Computer Communications, vol.29, issue.18, pp.3812-3824, 2006. ,
DOI : 10.1016/j.comcom.2006.06.018
Measuring the Overall Security of Network Configurations Using Attack Graphs, Data and Applications Security XXI, pp.98-112, 2007. ,
DOI : 10.1007/11805588_9
Modeling network diversity for evaluating the robustness of networks against zeroday attacks, ESORICS 2014, pp.494-511, 2014. ,
Exploring attack graph for costbenefit security hardening: A probabilistic approach. Computers & security, pp.158-169, 2013. ,
DOI : 10.1016/j.cose.2012.09.013
Cost-Aware Network Hardening with Limited Budget Using Compact Attack Graphs, 2014 IEEE Military Communications Conference, pp.152-157, 2014. ,
DOI : 10.1109/MILCOM.2014.31
Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks, IEEE Transactions on Information Forensics and Security, vol.11, issue.5, pp.1071-1086, 2016. ,
DOI : 10.1109/TIFS.2016.2516916