1. |
Lallie H S, Debattista K, Bal J. Evaluating practitioner cyber-security attack graph configuration preferences. Computers & Security, 2018, 79: 117-131.
|
2. |
Johnson P, Lagerstrom R, Ekstedt M, et al. Can the common vulnerability scoring system be trusted? A Bayesian analysis. IEEE Transactions on Dependable and Secure Computing, 2018,15(6):1002-1015.
|
3. |
Tripathy B K, Das D P, Jena S K, et al. Risk based security enforcement in software defined network. Computers & Security, 2018,78:321-335.
|
4. |
Bartos V, Zadnik M, Habib S M, et al. Network entity characterization and attack prediction. Future Generation Computer Systems, 2019, 97: 674-686.
|
5. |
Wang S, Tang G M, Kou G, et al. Attack path prediction method based on causal knowledge net. Journal on Communications, 2016, 37(10): 188-198(in Chinese).
|
6. |
Bharati M, Lomte S. A survey on hidden Markov model (HMM) based intention prediction techniques. International Journal of Engineering Research and Applications, 2016, 6(1): 167-172.
|
7. |
Yu J J, Hu M, Wang P. Evaluation and reliability analysis of network security risk factors based on D-S evidence theory. Journal of Intelligent & Fuzzy Systems, 2018, 34: 861-869.
|
8. |
Ghasemigol M , Ghaemi-Bafghi A , Takabi H. A comprehensive approach for network attack forecasting.Computers & Security,2016, 58: 83-105.
|
9. |
Kaynar K. A taxonomy for attack graph generation and usage in network security. Journal of Information Security and Applications, 2016, 29: 27-56.
|
10 |
Jiang Y Z, Hao Z F, Zhang Y S, et a1. Baysian forecasting evolutionary algorithm. Chinese Journal of Computers, 2014, 37(8): 1846-1858 (in Chinese).
|
11 |
Li R H, Yu J X, Huang X, et al. Measuring the impact of MVC attack in large complex networks. Information Sciences, 2014, 278: 685-702.
|
12 |
Thilak K D, Amuthan A. Cellular automata-based improved ant colony-based optimization algorithm for mitigating DDoS attacks in VANETs. Future Generation Computer Systems, 2018, 82: 304-314.
|
13 |
Wang H, Chen Z F, Zhao J P, et al. A vulnerability assessment method in industrial Internet of things based on attack graph and maximum flow. IEEE Access, 2018, 6: 8599-8609.
|
14 |
Shabut A M, Shamim K M, Dahal K P, et al. A multidimensional trust evaluation model for MANETs. Journal of Network and Computer Applications, 2018, 123: 32-41
|