1. Almeshekah, M., and Spafford, E. (2014, January 15–18). Planning and Integrating Deception into Computing Security Defenses. Proceedings of the 2014 New Security Paradigms Workshop, Victoria, BC, Canada.
2. Whaley, B. (1969). Stratagem: Deception and Surprise in War, Center for International Studies, Massachusetts Institute of Technology.
3. Yuill, J. (2006). Defensive Computer—Security Operations: Processes, Principles and Techniques, ProQuest.
4. Boyd, J. (2022, September 11). Essence of Winning and Losing. Available online: http://www.danford.net/boyd/essence.htm.
5. Attack graph-based moving target defense in software-defined networks;Yoon;IEEE Trans. Netw. Serv. Manag.,2020