“…Literature review results on the selection of mitigation actions for cyber-attacks Approach Category Approaches No automation N=3, Visualization (Gonzalez- Granadillo et al, 2015;Granadillo et al, 2012;Gonzalez-Granadillo et al, 2017) Heuristic Approach N=3, (Chung et al, 2013;Kotenko and Doynikova, 2016;Doynikova and Kotenko, 2018) Single-objective Optimization N=8, Ant Colony (Wang et al, 2013), Bellman Method (Zonouz et al, 2009;Zonouz and Haghani, 2013;Miehling et al, 2015), Genetic Algorithm (Poolsappasit et al, 2012;Garzia et al, 2017;Li et al, 2018;Chehida et al, 2020) Multi-objective Optimization N=10, Branch & Bound Integer Optimization (Roy et al, 2012),Genetic Algorithm , NSGA-II algorithm (Dewri et al, 2012;Rachedi and Benslimane, 2016;Lee et al, 2017;Hasan et al, 2018;Enoch et al, 2019), Single Additive Weighting & Weighted Product method (Shameli-Sendi and Dagenais, 2015;Shameli-Sendi et al, 2018), Tabu Search algorithm (Viduto et al, 2012) of the objective functions examined can be improved without the value of some other objective deteriorating. Solutions with this property are called non-dominated or Pareto optimal.…”