1. Parikh, D., Chen, T.: Data fusion and cost minimization for intrusion detection. IEEE Trans. Inf. Forensics Secur. 3(3), 381–389 (2008)
2. Gui, H.X.: Research of the intrusion detection system based on data mining. In: Proceeding of the International Conference on e-Education Entertainment and e-Management, pp. 190–192 (2011)
3. Zhang, B.Y., Chen, Z.Q., Tang, W.S., Fan, Q., Yan, X.A., Wang, S.L.: Network security situation assessment based on stochastic game model. Adv. Intell. Comput. 6838, 517–525 (2011)
4. Lv, H.Y., Cao, Y.D.: Research on network risk situation assessment based on threat analysis. In: 2008 International Symposium on Information Science and Engineering, pp. 252–257 (2008)
5. Wei, Y., Lian, Y.F.: Network security situational awareness model based on log audit and performance correction. Chin. J. Comput. 32(4), 763–772 (2009)