1. Cyber deception: virtual networks to defend insider reconnaissance;Achleitner,2016
2. Sequential and parallel attack tree modelling;Arnold,2015
3. Mitigating crossfire attacks using SDN-based moving target defense;Aydeger,2016
4. An introduction to network address shuffling;Cai,2016
5. Analysis of network address shuffling as a moving target defense;Carroll,2014