1. Yoshimoto, M., Bista, B.B., Takata, T.: Development of security scanner with high portability and usability. In: International Conference on Advanced Information Networking & Applications (2005)
2. Taylor, P., Mewett, S., Brass, P.C., et al.: Vulnerability assessment and authentication of a computer by a local scanner.: US, 7178116B1 (2007)
3. Thacker, B.H., Riha, D.S., Fitch, S.H.K., et al.: Probabilistic engineering analysis using the NESSUS software. IEEE Int. Conf. Neural Netw. 28(1–2), 83–107 (2006)
4. Zhang, W., Teng, S.H., Fu, X.F.: Scan attack detection based on distributed cooperative model. In: International Conference on Computer Supported Cooperative Work in Design (2008)
5. Kennedy, J., Eberhart, R.: Particle swarm optimization. IEEE Int. Conf. Neural Netw. 4, 1942–1948 (1995)