1. Aldarwbi, M.Y., Lashkari, A.H., Ghorbani, A.A.: The sound of intrusion: a novel network intrusion detection system. Comput. Electr. Eng. 104(PA) (2022)
2. Shi, Y., Chang, X., Rodríguez, R.J., et al.: Quantitative security analysis of a dynamic network system under lateral movement-based attacks. Reliab. Eng. Syst. Saf. 183, 213–225 (2019)
3. Phillips, C., Swiler, L.P.: A graph-based system for network-vulnerability analysis. In: Proceedings of the 1998 Workshop on New Security Paradigms, pp. 71–79 (1998)
4. Niakanlahiji, A., Wei, J., Alam, M.R., et al.: ShadowMove: a stealthy lateral movement strategy. In: 29th USENIX Security Symposium (USENIX Security 20), pp. 559–576 (2020)
5. Longzheng, C., Shengsheng, Y., Jing-li, Z.: Research and implementation of remote desktop protocol service over SSL VPN. In: IEEE International Conference on Services Computing, 2004 (SCC 2004). Proceedings. 2004, pp. 502–505. IEEE (2004)