1. A systematic survey on multi-step attack detection;Navarro;Comput. Secur.,2018
2. Multi-stage attack detection: Emerging challenges for wireless networks;Lefoane,2022
3. Attack scenario reconstruction approach using attack graph and alert data mining;Hu;J. Inf. Secur. Appl.,2020
4. A model-based survey of alert correlation techniques;Salah;Comput. Netw.,2013
5. ISO/IEC 27001:2022. Information Technology-Security Techniques-Information Security Management Systems-Requirements;International Organization for Standardization,2022