1. Last line of defense: reliability through inducing cyber threat hunting with deception in scada networks;Ajmal;IEEE Access,2021
2. Toward network configuration randomization for moving target defense;Al-Shaer,2011
3. Evaluation for combination of shuffle and diversity on moving target defense strategy for cloud computing;Alavizadeh,2018
4. Effective security analysis for combinations of mtd techniques on cloud computing (short paper);Alavizadeh,2017
5. Model-based evaluation of combinations of shuffle and diversity mtd techniques on the cloud;Alavizadeh;Future Gener. Comput. Syst.,2020