1. Li Zhi-tang, Lei J, Wang L, Li D (2017). A Data Mining Approach to Generating Network Attack Graph for Intrusion Prediction. Proceedings IEEE Fourth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2017)
2. Tabia K (Mai 2018) Approches basées sur les réseaux Bayésiens pour la prédiction d’attaques sévères, 5èmes Journées Francophones sur les Réseaux Bayésiens. Philippe Leray. Nantes, pp 10–11
3. Tesnim, Younes, KES AMSTA (2021) Farah Jemili: A Multi-Agent-Based System for Intrusion Detection, 15th International Conference on Agent and Multi-Agent Systems-Technologies and Applications, 2021, DOI: 10.1007/978-981-16-2994-5_15, EID: 2-s2.0-85111157042, Part of ISSN: 21903026 21903018
4. Ning, Xu (2013) ”Learning attack strategies from intrusion alerts”. In: Proc. 10th ACM Conf. on Computer and Communications Security, pp. 200–209. Washington D.C, 2013
5. Qin X, Lee W (2014) Attack plan recognition and prediction using causal networks. In ACSAC: Proceedings of the 20th Annual Computer Security Applications Conference, pages 370.379,