Bibliography

  1. Aaron Pendergrass, J., Lee, S.C., and Durward McDonell, C. (2013). Theory and practice of mechanized software analysis. Johns Hopkins APL Technical Digest 32 (2).
  2. Abraham, S. and Nair, S. (2017). Comparative analysis and patch optimization using cyber security analytics framework. Journal of Defense Modeling and Simulation 15 (2): 161–180.
  3. Amina, L. (2012). Patent No. 20120096549.
  4. Arnwine, M. (2015). Developing the infrastructure and methodologies for cyber security. In: 18th Annual Systems Engineering Conference. NDIA.
  5. Australian Government Department of Defence (n.d.). Strategies to Mitigate Cyber Security Incidents. https://www.asd.gov.au/infosec/mitigationstrategies.htm (accessed 4 November 2016).
  6. Backhaus, S., Bent, R., Bono, J. et al. (2013). Cyber physical security: a game theory model of humans interadcting over control systems. IEEE Transactions on Smart Grid 4 (4): 2320–2327.
  7. Bakke, C.P. and Suresh K. Damodaran (2015). The Cyber‐Range Event Process. Cambridge: Cyber Range Interoperability Standards Working Group (CRIS WG).
  8. Becker, J., Knackstedt, R., and Pöppelbuß, J. (2009). Developing maturity models for it management – a procedure model and its application. Business and Information Systems Engineering 1 (3): 213–222.
  9. Beidleman, S. (2009). Defining and Deterring Cyber War. Carlisle: US Army War College.
  10. Ben‐Asher, N., Oltramari, A., Erbacher, R.F., and Gonzalez, C. (2015). Ontology based adaptive systems of cyber defense. Proceedings of the 10th Internatioanl ...

Get An Introduction to Cyber Modeling and Simulation now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.