1. Towards a better understanding of ubiquitous cloud computing;Vahdat-Nejad;Int J Cloud Appl Comput (IJCAC),2018
2. Guide to security for full virtualization technologies - Recommendations of the national institute of standards and technology;Scarfone,2011
3. Computer and cyber security: principles, algorithm, applications, and perspectives;Gupta,2018
4. Network vulnerability assessment using bayesian networks;Liu;Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security,2005
5. Using bayesian networks for cyber security analysis;Xie,2010