1. Zhang, R., Liu, G., Liu, J., et al.: Analysis of message attacks in aviation data-link communication. IEEE Access 6, 455–463 (2018)
2. Cheng, J., Xu, R., Tang, X., Sheng, V.S., Cai, C.: An abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environment. CMC Comput. Mater. Continua 55(1), 095–119 (2018)
3. Cheang, C.F., Wang, Y., Cai, Z., Xu, G.: Multi-VMs intrusion detection for cloud security using dempster-shafer theory. CMC Comput. Mater. Continua 57(2), 297–306 (2018)
4. Wang, Y., Cheng, L., Ma, X.: A survey of threat behavior detection techniques using alert correlation. J. Natl. Univ. Def. Technol. 39(5) (2017)
5. Valeur, F., Vigna, G., Kruegel, C., Kemmerer, R.: Comprehensive approach to intrusion detection alert correlation. IEEE Trans. Dependable Secur. Comput. 1(3), 146–169 (2004)