1. A systematic approach to multi-stage network attack analysis;Dawkins,2004
2. Intrusion detection: a brief history and overview;Kemmerer;Computer. Papers,2002
3. A study on cyber threat prediction based on intrusion detection event for APT attack detection
4. 0-day vulnerabilities and cybercrime;Armin,2015
5. Analysis of vulnerabilities in internet firewalls;Kamara;C&S. Papers,2003