1. Comparing vulnerability severity and exploits using case-control studies;Allodi;ACM Trans. Inf. Syst. Secur.,2014
2. Proactive identification of exploits in the wild through vulnerability mentions online;Almukaynizi,2017
3. Survey on multiclass classification methods;Aly;Neural Netw.,2005
4. Information security management in university campus using cognitive security;Andrade;Int. J. Comput. Sci. Inf. Secur.,2019
5. Cognitive security: A comprehensive study of cognitive science in cybersecurity;Andrade;J. Inform. Secur. Appl.,2019