HembergEZipkinJRSkowyraRW, et al. Adversarial co-evolution of attack and defense in a segmented computer network environment. In: proceedings of the genetic and evolutionary computation conference companion, Kyoto, 15–19 July 2018, pp.1648–1655. New York: ACM.
2.
WagnerNSahinCSPenaJ, et al. A nature-inspired decision system for secure cyber network architecture. In: 2017 IEEE symposium series on computational intelligence (SSCI), Honolulu, HI, 27 November–1 December 2017, pp.1–8. Piscataway, NJ: IEEE.
3.
WinterroseMLCarterKMWagnerN, et al. Balancing security and performance for agility in dynamic threat environments. In: 2016 46th annual IEEE/IFIP international conference on dependable systems and networks (DSN), Toulouse, 28 June–1 July 2016, pp.607–617. Piscataway, NJ: IEEE.
4.
NIST. Framework for improving critical infrastructure cybersecurity, version 1.1. Technical report, National Institute for Standards and Technology (NIST), 2018.
5.
StermanJD. Business dynamics: systems thinking and modeling for a complex world. HD30. 2 S7835 2000, 2000.
6.
ZeiglerBPKimTGPraehoferH. Theory of modeling and simulation. 2nd ed.Orlando, FL: Academic Press, Inc., 2000.
7.
FishmanGS. Discrete-event simulation: modeling, programming, and analysis. Berlin: Springer Science & Business Media, 2013.