1. Ehab Al-Shaer , Qi Duan , and Jafar Haadi Jafarian . 2013. Random Host Mutation for Moving Target Defense . In Security and Privacy in Communication Networks (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ), , Angelos D. Keromytis and Roberto Di Pietro (Eds.). Springer , Berlin, Heidelberg , 310--327. https://doi.org/10.1007/978--3--642--36883--7_19 10.1007/978--3--642--36883--7_19 Ehab Al-Shaer, Qi Duan, and Jafar Haadi Jafarian. 2013. Random Host Mutation for Moving Target Defense. In Security and Privacy in Communication Networks (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ), , Angelos D. Keromytis and Roberto Di Pietro (Eds.). Springer, Berlin, Heidelberg, 310--327. https://doi.org/10.1007/978--3--642--36883--7_19
2. Callum Baillie Maxwell Standen Jonathon Schwartz Michael Docking David Bowman and Junae Kim. 2020. CybORG: An Autonomous Cyber Operations Research Gym. https://doi.org/10.48550/ARXIV.2002.10667 10.48550/ARXIV.2002.10667
3. Callum Baillie Maxwell Standen Jonathon Schwartz Michael Docking David Bowman and Junae Kim. 2020. CybORG: An Autonomous Cyber Operations Research Gym. https://doi.org/10.48550/ARXIV.2002.10667
4. Malek Ben Salem and Salvatore Stolfo. 2011. Decoy Document Deployment for Effective Masquerade Attack Detection. (2011) 35--54. https://doi.org/10.7916/D86W9 MFJ 10.7916/D86W9
5. Malek Ben Salem and Salvatore Stolfo. 2011. Decoy Document Deployment for Effective Masquerade Attack Detection. (2011) 35--54. https://doi.org/10.7916/D86W9 MFJ