A. D. Amico, L. Buchanan, and J. , Mission Impact of Cyber Events: Scenarios and Ontology to Express the Relationships between Cyber Assets, Missions, and Users, Proc. 5th Int'l Conf. on Information Warfare and Security, 2010.

J. Holsopple, S. J. Yang, and M. Sudit, Mission Impact Assessment for Cyber Warfare. Book chapter in Intelligent Methods for Cyber Warfare, 2015.
DOI : 10.1007/978-3-319-08624-8_11

G. Jakobson, Mission Cyber Security Situation Assessment Using Impact Dependency Graphs, In Information Fusion (FUSION), 2011.

R. Sawilla and X. Ou, Identifying critical attack assets in dependency attack graphs. Defense R&D Canada-Ottawa, 2008.
DOI : 10.1007/978-3-540-88313-5_2

URL : http://cis.ksu.edu/~xou/publications/esorics08.pdf

R. R. Yager, On ordered weighted averaging aggregation operators in multicriteria decisionmaking, IEEE Transactions on Systems, Man, and Cybernetics, vol.18, issue.1, pp.183-190, 1988.
DOI : 10.1109/21.87068

X. Ou, W. F. Boyer, and M. A. Mcqueen, A scalable approach to attack graph generation, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, 2006.
DOI : 10.1145/1180405.1180446

URL : http://www.cse.psu.edu/~tjaeger/cse598-f11/docs/ou_attack_graphs.pdf

X. Ou, S. Govindavajhala, and A. W. Appel, MulVAL: A Logic-based Network Security Analyzer. USENIX security, 2005.

O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. M. Wing, Automated generation and analysis of attack graphs, Proceedings 2002 IEEE Symposium on Security and Privacy, 2002.
DOI : 10.1109/SECPRI.2002.1004377

C. R. Ramakrishnan and R. Sekar, Model-based analysis of configuration vulnerabilities, Journal of Computer Security, 2002.

C. Phillips and L. P. Swiler, A graph-based system for network-vulnerability analysis, Proceedings of the 1998 workshop on New security paradigms , NSPW '98, 1998.
DOI : 10.1145/310889.310919

URL : https://digital.library.unt.edu/ark:/67531/metadc711473/m2/1/high_res_d/672082.pdf

S. Jajodia, S. Noel, and B. O. Berry, Topological analysis of network attack vulnerability , Managing Cyber Threats, 2005.
DOI : 10.1145/1229285.1229288

P. Ammann, D. Wijesekera, and S. Kaushik, Scalable, graph-based network vulnerability analysis, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, 2002.
DOI : 10.1145/586110.586140

K. Ingols, R. Lippmann, and K. Piwowarski, Practical Attack Graph Generation for Network Defense, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 2006.
DOI : 10.1109/ACSAC.2006.39

URL : http://www.acsac.org/2006/papers/70.pdf

X. Sun, J. Dai, A. Singhal, and P. Liu, Inferring the Stealthy Bridges Between Enterprise Network Islands in Cloud Using Cross-Layer Bayesian Networks, 2014.
DOI : 10.1109/CSAC.2003.1254306

Y. Zhang, HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis, 2011 IEEE Symposium on Security and Privacy, 2011.
DOI : 10.1109/SP.2011.31

T. Ristenpart, Hey, you, get off of my cloud, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, 2009.
DOI : 10.1145/1653662.1653687

Y. Younis, K. Kifayat, and M. Merabti, Cache side-channel attacks in cloud computing, International Conference on Cloud Security Management (ICCSM), 2014.

X. Chen, M. Zhang, Z. M. Mao, and P. Bahl, Automating Network Application Dependency Discovery: Experiences, Limitations, and New Solutions, Proceedings of the 8th USENIX conference on Operating systems design and implementation (OSDI), 2008.

A. Natarajan, P. Ning, Y. Liu, S. Jajodia, and S. E. Hutchinson, NSDMiner: Automated discovery of Network Service Dependencies, 2012 Proceedings IEEE INFOCOM, 2012.
DOI : 10.1109/INFCOM.2012.6195642

URL : http://discovery.csc.ncsu.edu/pubs/infocom12-NSDMiner.pdf

B. Peddycord, I. , P. Ning, and S. Jajodia, On the accurate identification of network service dependencies in distributed systems, USENIX Association Proceedings of the 26th international conference on Large Installation System Administration: strategies, tools, and techniques