1. Hoffmann J Simulated penetration testing: from “Dijkstra” to “Turing Test++” 2015 Jerusalem, Israel
2. Obes JL Sarraute C Richarte G Attack planning in the real world 2010 Minneapolis, MN
3. Sohrabi S Udrea O Riabov A Hypothesis exploration for malware detection using planning 2013 New York, NY
4. Riabov AV Sohrabi S Sow D Turaga D Udrea O Vu L Planning-based reasoning for automated large-scale data analysis 2015 New York, NY
5. HM Government Requirements for Basic Technical Protection from Cyber Attacks http://www.cyberstreetwise.com/cyberessentials/files/requirements.pdf 2014