1. Intelligent, automated red team emulation
2. Thomas Back . 1996. Evolutionary algorithms in theory and practice: evolution strategies, evolutionary programming, genetic algorithms . Oxford university press . Thomas Back. 1996. Evolutionary algorithms in theory and practice: evolution strategies, evolutionary programming, genetic algorithms. Oxford university press.
3. Lance Cleghorn. 2013. Network defense methodology: A comparison of defense in depth and defense in breadth. (2013). Lance Cleghorn. 2013. Network defense methodology: A comparison of defense in depth and defense in breadth. (2013).
4. A Master Attack Methodology for an AI-Based Automated Attack Planner for Smart Cities
5. S Haque , M Keffeler , and T Atkison . 2017 . An evolutionary approach of attack graphs and attack trees: A survey of attack modeling . In Proceedings of the International Conference on Security and Management (SAM). The Steering Committee of The World Congress in Computer Science, Computer ..., 224--229 . S Haque, M Keffeler, and T Atkison. 2017. An evolutionary approach of attack graphs and attack trees: A survey of attack modeling. In Proceedings of the International Conference on Security and Management (SAM). The Steering Committee of The World Congress in Computer Science, Computer ..., 224--229.