1. T. Bass, “Multisensor Data Fusion for Next Generation Distributed Intrusion Detection System,” inProceedings of the IRIS National Symposium on Senor and Data Fusion, pp. 1-6, The Johns Hopkins University, America, 1999 2. S. Mathew, C. Shah,S. Upadhyaya, “An Alert Fusion Framework for Situation Awareness of Coordinated Multistage Attacks,” inProceedings of the Third IEEE International Workshop on Information Assurance, pp. 95-104, College Park, MD, USA, 2005 3. S. J. Yang, S. Byers, J. Holsopple, B. Argauer,D. Fava, “Intrusion Activity Projection for Cyber Situational Awareness,” inProceedings of the IEEE International Conference on Intelligence and Security Informatics, pp. 167-172, Taipei, 2008 4. D. S. Fava, S. R. Byers,S. J. Yang, “Projecting Cyberattacks Through Variable-Length Markov Models,” IEEE Transactions on Information Forensics and Security, Vol. 3, No. 3, pp. 359-369, September 2008 5. C. Fachkha, E. Bou-Harb,M. Debbabi, “Towards a Forecasting Model for Distributed Denial of Service Activities,” inProceedings of the 12th International Symposium on Network Computing and Applications, pp. 110-117, Cambridge, 2013 6. G. Chen, D. Shen, C. Kwan, J. B. Cruz,M. Kruger, “Game Theoretic Approach to Threat Prediction and Situation Awareness,” inProceedings of the 9th International Conference on Information Fusion, pp. 1-8, Florence, 2006 7. F. M. Liu, J. Z. Wang,Z. B. Zhang, “Network Security Situation Prediction of Combined Kernel Function Correlation Vector Machine,” Application Research of Computers, Vol. 33, No. 8, pp. 2417-2419+2424, October 2016 8. Y. Wei, Y. F. Lian,D. G. Feng, “A Network Security Situation Assessment Model based on Information Fusion,” Journal of Computer Research and Development, Vol. 46, No. 3, pp. 353-362, March 2009 9. Y. L. Liu, D. G. Feng, Y. F. Lian, K. Chen,D. Wu, “A Network Security Situation Prediction Method based on Time and Space Dimensional Analysis,” Journal of Computer Research and Development, Vol. 51, No. 8, pp. 1681-1694, August 2009 10. T. Q.Huang and Y. Zhuang, “A Real-Time Network Security Situation Prediction Method,” Small Micro Computer System, Vol. 35, No. 2, pp. 303-306, January 2014 11. W. D. Gan, C. Zhou,B. Song, “A Network Security Situation Prediction Model based on RAN-RBF Neural Network,” Computer Science, Vol. 43, No. 2, pp. 388-392, November 2016 12. W. P. Chen, Z. G. Zang, J. Guo,J. Dong, “The Security Assessment of Network Space Situational Awareness System based on Improved BP Neural Network,” Computer Science, Vol. 45, No. 2, pp. 335-337+341, November 2018 13. J. Wu, L. Yin,Y. Guo, “Cyber Attacks Prediction Model based on Bayesian Network,” inProceedings of the 18th International Conference on Parallel and Distributed Systems, pp. 730-731, Singapore, 2012 14. J. B. Lai, H. Q. Wang,L. Zhu, “Study of Network Security Situation Awareness Model based on Simple Additive Weight and Grey Theory,” inProceedings of International Conference on Computational Intelligence and Security, pp. 1545-1548, Guangzhou, 2006 15. D. E. Rumelhart, G. E. Hinton,R. J. Williams, “Learning Representations by Back-Propagating Errors,” Nature, Vol.6080, No. 323, pp. 533-536, 1986 16. D. Q.Zhu and H. Shi, “Principle and Application of Artificial Neural Networks,” 2006 17. C. Li and X. Liu, “An Improved PSO-BP Neural Network and its Application to Earthquake Prediction,” inProceedings of Chinese Control and Decision Conference (CCDC), pp. 3434-3438, Yinchuan, 2016 18. S. Ding and C. Su, “Application of Optimizing BP Neural Networks Algorithm based on Genetic Algorithm,” inProceedings of the 29th Chinese Control Conference, pp. 2425-2428, Beijing, 2010 19. C. Dai, W. Chen,Y. Zhu, “Seeker Optimization Algorithm,” inProceedings of International Conference on Computational Intelligence and Security, pp. 225-229, Guangzhou, 2006 20. N. Metropolis, “Equation of State Calculations by Fast Computing Machines,” Journal of Chemical Physics, No. 21, pp. 1087, 1953 21. S. Kirkpatrick and M. P. Vecchi, “Optimization by Simulated Annealing,”Spin Glass Theory and Beyond: An Introduction to the Replica Method and its Applications, 1987 22. B. Aylaj, M. Belkasmi, H. Zouaki,A. Berkani, “Degeneration Simulated Annealing Algorithm for Combinatorial Optimization Problems,” inProceedings of the15th International Conference on Intelligent Systems Design and Applications (ISDA), pp. 557-562, Marrakech, 2015 |