1. CVE (2023, August 15). Common Vulnerabilities and Exposures. Available online: https://www.cve.org/.
2. Strom, B.E., Applebaum, A., Miller, D.P., Nickels, K.C., Pennington, A.G., and Thomas, C.B. (2018). Mitre att&ck: Design and philosophy, In Technical Report; The MITRE Corporation.
3. STG2P: A two-stage pipeline model for intrusion detection based on improved LightGBM and K-means;Zhang;Simul. Model. Pract. Theory,2022
4. Kaloroumakis, P.E., and Smith, M.J. (2021). Toward a Knowledge Graph of Cybersecurity Countermeasures, The MITRE Corporation.
5. Proceedings of the 2021 ACM Conference Knowledge Discovery and Data Mining (KDD’21) Workshop on AI-enabled Cybersecurity Analytics.