1. E. Al-Shaer, Q. Duan, and J. H. Jafarian. Random host mutation for moving target defense. In Proceedings of the 8th International Conference on Security and Privacy in Communication Networks, Padua, Italy, 2012.
2. M. Albanese, A. De Benedictis, S. Jajodia, and K. Sun. A moving target defense mechanism for manets based on identity virtualization. In Communications and Network Security (CNS), 2013 IEEE Conference on, pages 278--286, Oct 2013.
3. S. Antonatos, P. Akritidis, E. P. Markatos, and K. G. Anagnostakis. Defending against hitlist worms using network address space randomization. Comput. Netw., 51(12):3471--3490, 2007.
4. M. Atighetchi, P. Pal, F. Webber, and C. Jones. Adaptive use of network-centric mechanisms in cyber-defense. In ISORC '03, page 183. IEEE Computer Society, 2003.
5. W. v. d. G. C. Contavalli. Client subnet in dns requests. http://tools.ietf.org/html/draft-vandergaast-edns-client-subnet-00, 2011.