Research Journal of Applied Sciences
Year:
2015
Volume:
10
Issue:
11
Page No.
758 - 762
References
Abadi, M. and S. Jalili, 2006. An ant colony optimization algorithm for network vulnerability analysis. Iran. J. Electr. Electron. Eng., 2: 106-120.
Direct Link | Abadi, M. and S. Jalili, 2008. Minimization analysis of network attack graphs using genetic algorithms. IJ Comput. Appl., 15: 263-273.
Abadi, M. and S. Jalili, 2015. A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs. ISC Int. J. Inf. Secur., 2: 13-32.
Direct Link | Alhomidi, M. and M. Reed, 2014. Attack graph-based risk assessment and optimisation approach. Int. J. Network Secur. Appl.,
Eiben, A.E. and J.E. Smith, 2003. Introduction to Evolutionary Computing. Springer, New York, USA., ISBN-13: 9783540401841, Pages: 199.
Engelbrecht, A.P., 2005. Fundamentals of Computational Swarm Intelligence. 1st Edn., John Wiley and Sons Publishing Inc., New York, USA., ISBN-13: 9780470091913, Pages: 672.
Krasnogor, N., A. Aragon and J. Pacheco, 2006. Memetic Algorithms. In: Metaheuristic Procedures for Training Neutral Networks, Alba, E. and R. Marti (Eds.). Springer, New York, USA., ISBN-13: 9780387334158, pp: 225-248.
Lufeng, Z., T. Hong, C. YiMing and Z. JianBo, 2009. Network security evaluation through attack graph generation. World Acad. Sci. Eng. Technol., 54: 412-416.
Direct Link | Moscato, P. and C. Cotta, 2007. Memetic Algorithms. In: Handbook of Approximation Algorithms and Metaheuristics, Gonzalez, T.F. (Ed.). Taylor and Francis, Boca Raton, FL., pp: 27-1-27-12.
Noel, S., S. Jajodia, L. Wang and A. Singhal, 2010. Measuring security risk of networks using attack graphs. Int. J. Next Gener. Comput., 1: 135-147.
Direct Link | Sheyner, O., J. Haines, S. Jha, R. Lippmann and J.M. Wing, 2002. Automated generation and analysis of attack graphs. Proceedings of the IEEE Symposium Security and Privacy, May 22-25, 2011, California, USA, pp: 273-284.