1. Generating war game strategies using a genetic algorithm;T E Revello;Computational Intelligence,2002
2. The long history of gaming in military training;R Smith;Simulation & Gaming,2009
3. How to systematically classify computer security intrusions;U Lindqvist;Security and Privacy, 1997. Proceedings., 1997 IEEE Symposium,1997
4. A new taxonomy of web attacks suitable for efficient encoding;G;Computers & Security,2003