1. P.K. Manadhata, J.M. Wing, An attack surface metric. IEEE Trans. Softw. Eng. 37(3), 371–386 (2011)
2. Executive Office of the President, National Science and Technology Council, “Trustworthy cyberspace: Strategic plan for the federal cybersecurity research and development program,” December 2011, URL
http://www.whitehouse.gov/
3. M. Dunlop, S. Groat, R. Marchany, J. Tront, Implementing an IPv6 Moving Target Defense on a Live Network, in Proceedings of the National Moving Target Research Symposium, (Cyber-Physical Systems Virtual Organization, Annapolis, 2012)
4. Q. Duan, E. Al-Shaer, J.H. Jafarian, Efficient Random Route Mutation Considering Flow and Network Constraints, in Proceedings of the 1st IEEE Conference on Communications and Network Security (IEEE CNS 2013), (IEEE, Washington, DC, 2013), pp. 260–268
5. J.H. Jafarian, E. Al-Shaer, Q. Duan, Openflow Random Host Mutation: Transparent Moving Target Defense Using Software Defined Networking, in Proceedings of the 1st ACM Workshop on Hot Topics in Software Defined Networks (HotSDN 2012), (ACM, Helsinki, 2012), pp. 127–132