1. Goldberg, D.E.: Genetic Algorithms in Search, Optimization and Machine Learning. Addison-Wesley Longman Publishing Co., Inc., Boston (1989)
2. Coello, C.A.C., Nacional, L.: An updated survey of ga-based multiobjective optimization techniques. ACM Computing Surveys 32, 109–143 (1998)
3. Lu, W., Traore, I.: Detecting new forms of network intrusion using genetic programming. In: Proceedings of the 2003 Congress on Evolutionary Computation (2003)
4. Noel, S., Jajodia, S.: Attack graphs for sensor placement, alert prioritization, and attack response. In: Cyberspace Research Workshop (2007)
5. Rolando, M., Rossi, M., Sanarico, N., Mandrioli, D.: A formal approach to sensor placement and configuration in a network intrusion detection system. In: SESS 2006: Proceedings of the 2006 international workshop on Software engineering for secure systems, pp. 65–71. ACM, New York (2006)