1. A model driven approach for cyber security scenarios deployment;Braghin,2019
2. What you always wanted to know about datalog (and never dared to ask);Ceri,1989
3. Research methods for cyber security;Edgar,2017
4. A survey of botnet and botnet detection;Feily,2009
5. Detecting malicious powershell commands using deep neural networks;Hendler,2018