This work is licensed under the Creative Commons Attribution 4.0 International License.
Sujan Ghimire, Ravinesh C. Deo, Nawin Raj, Jianchun Mi. (2019). Deep solar radiation forecasting with convolutional neural network and long short-term memory network algorithms. Applied Energy, 253.Search in Google Scholar
Yuantao Yao, Jin Wang, Pengcheng Long, Min Xie, Jianye Wang. (2020). Small‐batch‐size convolutional neural network based fault diagnosis system for nuclear energy production safety with big‐data environment. International Journal of Energy Research, 44(7).Search in Google Scholar
Iman Sharafaldin, Arash Habibi Lashkari, Ali A. (2019). Ghorbani. An evaluation framework for network security visualizations. Computers & Security, 84.Search in Google Scholar
Madhusanka Liyanage, Andrei Gurtov. (2014). Securing virtual private LAN service by efficient key management. Security and Communication Networks, 7(1).Search in Google Scholar
Chirag Modi, Dhiren Patel, Bhavesh Borisaniya, Hiren Patel, Avi Patel,Muttukrishnan Rajarajan. (2013). A survey of intrusion detection techniques in Cloud. Journal of Network and Computer Applications, 36(1).Search in Google Scholar
Li, W., Zhu, H. (2021). Research on Comprehensive Enterprise Network Security//2021 IEEE 11th International Conference on Electronics Information and Emergency Communication (ICEIEC) 2021 IEEE 11th International Conference on Electronics Information and Emergency Communication (ICEIEC). IEEE, 1-6.Search in Google Scholar
Sally, M. (2020). Elghamrawy. Security in Cognitive Radio Network: Defense against Primary User Emulation attacks using Genetic Artificial Bee Colony (GABC) algorithm. Future Generation Computer Systems, 109.Search in Google Scholar
Mazen Juma, Azza Abdel Monem, Khaled Shaalan. (2020). Hybrid End-to-End VPN Security Approach for Smart IoT Objects. Journal of Network and Computer Applications, 158.Search in Google Scholar
Khaleghi B., Khamis A., Karray F O., et al. (2013). Multisensor data fusion: A review of the state-of-theart. Information Fusion, 14(1), 28-44.Search in Google Scholar
Abdlhamed, M., Kifayat, K., Shi, Q., et al. (2017). Intrusion prediction systems//Information fusion for cyber-security analytics. Springer, Cham, 155-174.Search in Google Scholar
Dugad, R., Desai, U B. (2020). A tutorial on hidden Markov models. Proceedings of the IEEE: Applications in Speech Recognition, 77(2), 25-286.Search in Google Scholar
Murphy, C. (2014). Combining belief functions when evidence conflicts. Decision Support systems, 29(07), 1-9.Search in Google Scholar
Hernández, A., Sanchez, V., Sánchez, G., et al. (2016). Security attack prediction based on user sentiment analysis of Twitter data//2016 IEEE international conference on industrial technology (ICIT). IEEE, 610-617.Search in Google Scholar
Yager, R. R. (2019). Comparing approximate reasoning and proba⁃ bilistic reasoning using the Dempster-Shafer work. International Journal of Approximate Reasoning, 50(05), 812-821.Search in Google Scholar
Husák, M., Komárková, J., Bou-Harb, E., et al. (2018). Survey of attack projection, prediction, and forecasting in cyber security. IEEE Communications Surveys & Tutorials, 21(1), 640-660.Search in Google Scholar
Dutt, V., Ahn, Y. S., Gonzalez, C. (2013). Cyber Situation Awareness Modeling Detection of Cyber Attacks With Instance-Based Learning Theory. Human Factors: The Journal of the Human Factors and Ergonomics Society, 55(3), 605-618.Search in Google Scholar
Yi-Bing, L., Iian, K., Hong, X. (2017). The Algorithm Aiming at Conflict to Improve DS Evidencd Theory. Information Technology Journal, 10(09), 1779-1783.Search in Google Scholar
Shrivas, A. K., Dewangan, A. K., Shrivas, A. K., et al. (2014). An Ensemble Model for Classification of Attacks with Feature Selection based on KDD99 and NSL-KDD Data Set. 99(15), 8-13.Search in Google Scholar
Kasac, J., Deur, J., Novakovic, B., et al. (2019). A conjugate gradient-based BPTT-like optimal control algorithm. 2009 IEEE Multi-conference on Systems and Control, 861-866Search in Google Scholar
Storn, R., Price, K. (2017). Differential evolutiona simple and efficient heuristic for global optimization over continuous spaces. Journal of Global Optimization, 11 (4), 341-359Search in Google Scholar
Li, J., Shi, Y., Xue, Z. (2016). APT Detection based on DNS Traffic and Threat Intelligence. Information Security and Communications Privacy, 84-88.Search in Google Scholar
Bar, A., Shapira, B., Rokach, L., et al. (2016). Identifying attack propagation patterns in honeypots using Markov chains modeling and complex networks analysis//2016 IEEE international conference on software science, technology and engineering (SWSTE). IEEE, 28-36.Search in Google Scholar
Ali, O., Ishak, M. K., Bhatti, M. K. L., et al. (2022). A Comprehensive Review of Internet of Things: Technology Stack, Middlewares, and Fog/Edge Computing Interface. Sensors, 22(3), 995.Search in Google Scholar
Zittrain, J. (2008). Ubiquitous human computing. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 366 (1881), 3813-3821.Search in Google Scholar
Han Guangjie, He Yu, Jiang Jinfang, et al, (2019). A Synergetic Trust Model Based on SVM in Underwater Acoustic Sensor Networks. IEEE Transactions on Vehicular Technology, 68(11), 11239-11247.Search in Google Scholar
Serpen, G., Aghaei, E. (2018). Host-based misuse intrusion detection using PCA feature extraction and kNN classification algorithms. Intelligent Data Analysis, 22(5), 1101-1114.Search in Google Scholar
RB. Almeida, V. Covalski, R. Machado, et al. (2019). A hierarchical architectural model for network security exploring situational awareness. SAC ‘19: Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing. 1365–1372Search in Google Scholar
Jøsang, A., Bhuiyan, T. (2008). Optimal trust network analysis with subjective logic//2008 Second International Conference on Emerging Security Information, Systems and Technologies. IEEE, 179-184.Search in Google Scholar
Shrivas, A. K., Dewangan, A. K., Shrivas, A. K., et al. (2014). An Ensemble Model for Classification of Attacks with Feature Selection based on KDD99 and NSL-KDD Data Set, 99(15), 8-13.Search in Google Scholar
Polatidis, N., Pimenidis, E., Pavlidis, M., et al. (2017). Recommender systems meeting security: From product recommendation to cyber-attack prediction//International Conference on Engineering Applications of Neural Networks. Springer, Cham, 508-519.Search in Google Scholar