[1] J.C.Acosta,E.Padilla,MD, 2016.Augmenting attack graphs to represent data link and network layer vulnerabilities”,Military Communications Conference, MILCOM IEEE. Baltimore 1010 -1015
[2] A.O.Adetunmbi,S.O.Falaki,O.S.Adewale,B.K.Alese, 2008.Network intrusion detection based on rough set and knearest neighbor”,International Journal of Computing and ICT Research 2 60 -66
[3] A.O.Adetunmbi,B.K.Alese,O.Ogundele,S.O.Falaki, 2007.A data mining approach to network intrusion detection”,Journal of Computer Science & Its Application 1 24 -37
[4] T.Alpcan, 2010.Network security: A decision and gametheoretic approach”, -
[5] M.Aslam,C.Gehrmann, 2012.Security and trust preserving vm migrations in public clouds”,IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications 869 -876
[6] S.Beckery,J.Seibert,D.Zage,C.Nita-Rotaru,R.Statey, 2011.Applying game theory to analyze attacks and defenses in virtual coordinate systems”,Hong Kong, China 133 -144
[7] Y.L.Chen,Y.C.Yang,W.T.Lee, 2014.The study of using game theory for live migration prediction over cloud computing”, Springer, Intelligent Data analysis,its Applications 2 417 -425
[8] C.Clark,K.Fraser,S.Hand,J.G.Hansen,E.Jul,C.Limpach,I. Pratt,A, 2005.Live migration of virtual machines”,The 2nd Conference on Symposium on Networked Systems Design & Implementation 2 273 -286
[9] F.Cuppens,A, 2002.Alert correlation in a cooperative intrusion detection framework”, IEE symposium Security and privacy, 202 -215
[10] S.Debroy,P.Calyam,M.Nguyen,A.Stage,V.Georgiev, 2016.Frequency-minimal moving target defense using softwaredefined networking”,International Conference IEEE Computing, Networking and Communications (ICNC) 1 -6
[11] R.Divyambika,A, 2015.Protection of virtual machines during live migration in cloud environment”,Indian Journal of Science and Technology 8 333 -339
[12] S.El Kafhali, 2017.Stochastic modelling and analysis of cloud computing data center”,20th ICIN Conference Innovations in Clouds, Internet and Networks 122 -126
[13] I. ElMir,A.Chowdhary,D.Huang,S.Pisharody,D.S.Kim,A, 2016.Software defined stochastic model for moving target defense”,Third International Afro-European Conference for Industrial Advancement (AECIA16 188 -197
[14] I. ElMir,A.Haqiq,D.S.Kim, 2016.Performance analysis and security based on intrusion detection and prevention systems in cloud data centers,Springer International Conference on Hybrid Intelligent Systems 456 -465
[15] I. ElMir,D.S.Kim,A, 2015.Security modeling and analysis of a self-cleansing intrusion tolerance technique”,11th International Conference Information Assurance and Security (IAS) 111 -117
[16] I. ElMir,D.S.Kim,A, 2015.Security modeling and analysis of an intrusion tolerant cloud data center”,Third World Conference Complex Systems (WCCS) 1 -6
[17] I. ElMir,D.S.Kim,A, 2016.Cloud computing security modeling and analysis based on a self-cleansing intrusion tolerance technique”,Journal of Information Assurance & Security 5 -
[18] H.Holm,MD, 2016.,Military Communications Conference MILCOM, Baltimore 976 -981
[19] S.Jajodia,A.K.Ghosh,V.Swarup,C.Wang,X.S.Wang, 2011.Moving target defense: creating asymmetric uncertainty for cyber threats,Springer Science & Business Media 54 -
[20] S.Jajodia,S.Noel, 2005.Topological analysis of network attack vulnerability, 247 -266
[21] P.Johnson,M.Ekstedt, 2016.Reliability and Security (ARES), Salzburg, 278 -283
[22] C.A.Kamhoua,L.Kwiat,K.A.Kwiat,J.S.Park,M.Zhao,M.Rodriguez,AK, 2014.Game theoretic modeling of security and interdependency in a public cloud”,7th International Conference Cloud Computing (CLOUD) 514 -521
[23] R.Kavitha, 2017.Advanced Random Time Queue Blocking with Traffic Prediction for Defense of Low-rate DoS Attacks against Application Servers”,International Journal of Communication Networks and Information Security (IJCNIS) 9 95 -104
[24] L.Kwiat,C.A.Kamhoua,K.A.Kwiat,J.Tang, 2015.Security-aware virtual machine allocation in the cloud: A game theoretic approach”,8th International Conference Cloud Computing (CLOUD) 556 -563
[25] H.H.Nguyen,K.Palani,D.M.Nicol,MD, 2017.An approach to incorporating uncertainty in network security analysis”,The Hot Topics in Science of Security: Symposium and Bootcamp 74 -84
[26] X.Ou,S.Govindavajhala,A.W.Appel,MD, 2005.Mulval: A logicbased network security analyzer”, USENIX security symposium, 8 -
[27] S.B.Rathod,V.K.Reddy, 2014.Secure live vm migration in cloud computing: A survey”,International Journal of Computer Applications 2 -
[28] K.Sallhammar,S.J.Knapskog,B.E.Helvik, 2005.Using stochastic game theory to compute the expected behavior of attackers”, The 2005 Symposium on Applications and the Internet Workshops, 102 -105
[29] N.H.M.Saudi, 2017.Revealing the Feature Influence in HTTP Botnet Detection”,International Journal of Communication Networks and Information Security (IJCNIS) 9 274 -281
[30] A.Sen, 2016.Risk assessment in a sensor cloud framework using attack graphs”,No. 99 1 -1
[31] T.Sommestad,M.Ekstedt, 2013.The cyber security modeling language: A tool for assessing the vulnerability of enterprise system architectures”,IEEE Systems Journal 7 363 -373
[32] D.Sun,J.Zhang,T.Wang,C.Liu,W, 2016.Splm: security protection of live virtual machine migration in cloud computing”,The 4th ACM International Workshop on Security in Cloud Computing, Xi'an, China 2 -9
[33] S.C.Sundaramurthy,L.Zomlot,X.Ou, 2011.Practical ids alert correlation in the face of dynamic threats”, International Conference on Security and Management (SAM11), LasVegas, -
[34] R.Trost, 2009.Practical intrusion analysis: prevention and detection for the twenty-first century”,Pearson Education -
[35] O.A.Wahab,J.Bentahar,H.Otrok,A, 2016.How to distribute the detection load among virtual machines to maximize the detection of distributed attacks in the cloud? “,IEEE International Conference Services Computing (SCC) 316 -323
[36] Q.Wu,S.Shiva,S.Roy, 2010.On modeling and simulation of game theory based defense mechanisms against dos and ddos attacks”, The spring simulation multiconference, 159 -
[37] R.Yadav,R.N.Verma,A.K.Solanki, 2016.An improved model for analysis of host network vulnerability”,International Journal of Computer Applications 13 12 -16
[38] F.Zhang,Y.Huang,H.Wang,H.Chen,B.Zang, 2008.Palm: security preserving vm live migration for systems with vmmenforced protection”, The Third Asia-Pacific Trusted Infrastructure Technologies Conference, 9 -18
[39] R.Zhuang,S.Zhang,A.Bardas,S.A.DeLoach,X.Ou,A,December2017, December 2017.Investigating the application of moving target defenses to network security”,6th International Symposium Resilient Control Systems (ISRCS) 9 162 -169