1. 2016 US Government Cybersecurity Report (2016) https://cdn2.hubspot.net/hubfs/533449/SecurityScorecard_2016_Govt_Cybersecurity_Report.pdf . Accessed 14 Mar 2018
2. KDD Cup 1999 Data (1999) https://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html . Accessed 14 Mar 2018
3. A Java-based evolutionary computation and genetic programming research system (2013) https://cs.gmu.edu/~eclab/projects/ecj/ . Accessed 14 Mar 2018
4. The department of defense cyber strategy (2015) https://www.defense.gov/Portals/1/features/2015/0415_cyber-strategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf . Accessed 14 Mar 2018
5. Abass A, Hajimirsadeghi M, Mandayam N, Gajic Z (2016) Evolutionary game theoretic analysis of distributed denial of service attacks in a wireless network. In: Annual Conf. on information science and systems (CISS), pp 36–41