1. [1] A. Alshamrani, S. Myneni, A. Chowdhary, and D. Huang, “A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities,” IEEE Commun. Surveys Tuts., vol.21, no.2, pp.1851-1877, 2019. 10.1109/comst.2019.2891891
2. [2] M. Akbanov, V.G. Vassilakis, and M.D. Logothetis, “WannaCry ransomware: Analysis of infection, persistence, recovery prevention and propagation mechanisms,” J. Telecommunications and Information Technology, no.1, pp.113-124, 2019. 10.26636/jtit.2019.130218
3. [3] NMAP.org, Timing and Performance — nmap Network Scanning, https://nmap.org/book/man-performance.html (Accessed on 05/20/2021).
4. [4] U.S. National Science and Technology Council, “Trustworthy cyberspace: Strategic plan for the federal cybersecurity research and development program,” Federal Cybersecurity: Strategy and Implementation for Research and Development, pp.69-99, 2011.
5. [5] Software-Defined Networking (SDN) Definition, Open Networking Foundation, https://opennetworking.org/sdn-definition/ (Accessed on 05/28/2021).