1. NITRD CSIA Homepage, https://catalog.data.gov/dataset/trustworthy-cyberspace-strategic-plan-for-the-federal-cybersecurity-research-and-development , Accessed 27 May 2017
2. Zhuang, R., Deloach, S.A., Ou, X.: Towards a theory of moving target defense. In: 1st ACM Workshop on Moving Target Defense Proceedings, pp. 31–40. ACM, New York (2014)
3. CPS-VO Homepage, http://cps-vo.org/node/3854 , Accessed 11 June 2017
4. Duan, Q., Al-Shaer, E., Jafarian, H.: Efficient random route mutation considering flow and network constraints. In: Communications and Network Security Proceedings, pp. 260–268. IEEE, National Harbor (2013)
5. Kewley, D., Fink, R., Lowry, J., et al.: Dynamic approaches to thwart adversary intelligence gathering. In: DARPA Information Survivability Conference & Exposition II, pp. 176–185. IEEE, Anaheim (2002)