1. Localizing firewall security policies;Adão,2016
2. Al-Shabibi, A., McCauley, M., 2020. Pox controller. Available: https://noxrepo.github.io/pox-doc/html (Accessed: Mar 23, 2020).
3. Segmentation and architecture of networks with multiple entry points;Alabbad;Computer Networks,2020
4. Time-efficient and cost-effective network hardening using attack graphs;Albanese,2012
5. Internet of things: a survey on the security of IoT frameworks;Ammar;Journal of Information Security and Applications,2018