A Survey on Threat Situation Awareness Systems: Framework, Techniques, and Insights

Cyberspace is full of uncertainty in terms of advanced and sophisticated cyber threats which are equipped with novel approaches to learn the system and propagate themselves, such as AI-powered threats. To debilitate these types of threats, a modern and intelligent Cyber Situation Awareness (SA) system need to be developed which has the ability of monitoring and capturing various types of threats, analyzing and devising a plan to avoid further attacks. This paper provides a comprehensive study on the current state-of-the-art in the cyber SA to discuss the following aspects of SA: key design principles, framework, classifications, data collection, and analysis of the techniques, and evaluation methods. Lastly, we highlight misconceptions, insights and limitations of this study and suggest some future work directions to address the limitations.

[1]  Jin B. Hong,et al.  Evaluating the effectiveness of shuffle and redundancy MTD techniques in the cloud , 2021, Comput. Secur..

[2]  Jingyue Li,et al.  The AI-Based Cyber Threat Landscape , 2020, ACM Comput. Surv..

[3]  Julian Jang,et al.  Cyber Situation Awareness Monitoring and Proactive Response for Enterprises on the Cloud , 2020, 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom).

[4]  Yajun Guo,et al.  Nudging personalized password policies by understanding users' personality , 2020, Comput. Secur..

[5]  Ting Zhu,et al.  GENPass: A Multi-Source Deep Learning Model for Password Guessing , 2020, IEEE Transactions on Multimedia.

[6]  Meng Jiang Improving situational awareness with collective artificial intelligence over knowledge graphs , 2020 .

[7]  Interpretable Probabilistic Password Strength Meters via Deep Learning , 2020, ESORICS.

[8]  Weixin Xie,et al.  Private Machine Learning Classification Based on Fully Homomorphic Encryption , 2020, IEEE Transactions on Emerging Topics in Computing.

[9]  Yeqian Li Research on Network Security Situation Awareness Strategy Based on Markov Game Model , 2020, CSIA.

[10]  Florian Tramèr,et al.  On Adaptive Attacks to Adversarial Example Defenses , 2020, NeurIPS.

[11]  Julian Jang,et al.  An Automated Security Analysis Framework and Implementation for MTD Techniques on Cloud , 2019, ICISC.

[12]  Guang-qiu Huang,et al.  Analysis framework of network security situational awareness and comparison of implementation methods , 2019, EURASIP Journal on Wireless Communications and Networking.

[13]  Artificial intelligence and offensive cyber weapons , 2019 .

[14]  Changzhen Hu,et al.  An Improved Prediction Model for the Network Security Situation , 2019, SmartCom.

[15]  Rajeev Agrawal,et al.  Combining Tensor Decompositions and Graph Analytics to Provide Cyber Situational Awareness at HPC Scale , 2019, 2019 IEEE High Performance Extreme Computing Conference (HPEC).

[16]  Jinying Xu,et al.  DDoS Attack Situation Information Fusion Method Based on Dempster-Shafer Evidence Theory , 2019, ICAIS.

[17]  A. Felkner,et al.  A Novel Approach to National-level Cyber Risk Assessment Based on Vulnerability Management and Threat Intelligence , 2019, Journal of Telecommunications and Information Technology.

[18]  Giuseppe Santucci,et al.  MAD: A visual analytics solution for Multi-step cyber Attacks Detection , 2019, J. Comput. Lang..

[19]  Thomas Ristenpart,et al.  Beyond Credential Stuffing: Password Similarity Models Using Neural Networks , 2019, 2019 IEEE Symposium on Security and Privacy (SP).

[20]  Jianxin Li,et al.  Modeling and clustering attacker activities in IoT through machine learning techniques , 2019, Inf. Sci..

[21]  Elias Bou-Harb,et al.  Survey of Attack Projection, Prediction, and Forecasting in Cyber Security , 2019, IEEE Communications Surveys & Tutorials.

[22]  Georgios Ioannou,et al.  A Markov Multi-Phase Transferable Belief Model for Cyber Situational Awareness , 2019, IEEE Access.

[23]  Chip-Hong Chang,et al.  UDhashing: Physical Unclonable Function-Based User-Device Hash for Endpoint Authentication , 2019, IEEE Transactions on Industrial Electronics.

[24]  Shuo Wang,et al.  Research on Key Technologies of Network Security Situational Awareness for Attack Tracking Prediction , 2019 .

[25]  Fernando Pérez-Cruz,et al.  PassGAN: A Deep Learning Approach for Password Guessing , 2017, ACNS.

[26]  Robert A. Bridges,et al.  Situ: Identifying and Explaining Suspicious Behavior in Networks , 2019, IEEE Transactions on Visualization and Computer Graphics.

[27]  Mohamed Elhoseny,et al.  Deep Learning Framework for Cyber Threat Situational Awareness Based on Email and URL Data Analysis , 2019 .

[28]  Dongmei Zhao,et al.  Study on network security situation awareness based on particle swarm optimization algorithm , 2018, Comput. Ind. Eng..

[29]  Khaled Salah,et al.  A User Authentication Scheme of IoT Devices using Blockchain-Enabled Fog Nodes , 2018, 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA).

[30]  Jianhua Li,et al.  Big Data Analysis-Based Security Situational Awareness for Smart Grid , 2018, IEEE Transactions on Big Data.

[31]  Dongqin Feng,et al.  Network Security Situation Awareness for Industrial Control System Under Integrity Attacks , 2018, 2018 21st International Conference on Information Fusion (FUSION).

[32]  Fannv He,et al.  SCPN-based Game Model for Security Situational Awareness in the Intenet of Things , 2018, 2018 IEEE Conference on Communications and Network Security (CNS).

[33]  Risto Vaarandi,et al.  An unsupervised framework for detecting anomalous messages from syslog log files , 2018, NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium.

[34]  Khaled Salah,et al.  IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..

[35]  Ning Cao,et al.  Network Security Situation Awareness Framework based on Threat Intelligence , 2018 .

[36]  Yi Yang,et al.  Artificial Intelligence-Based Password Brute Force Attacks , 2018 .

[37]  Prabaharan Poornachandran,et al.  Scalable Framework for Cyber Threat Situational Awareness Based on Domain Name Systems Data Analysis , 2018 .

[38]  Igor V. Kotenko,et al.  AI- and Metrics-Based Vulnerability-Centric Cyber Security Assessment and Countermeasure Selection , 2018, Guide to Vulnerability Analysis for Computer Networks and Systems.

[39]  Alejandro Correa Bahnsen,et al.  DeepPhish : Simulating Malicious AI , 2018 .

[40]  James Cannady,et al.  Deep learning for prioritizing and responding to intrusion detection alerts , 2017, MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM).

[41]  Ben Y. Zhao,et al.  Automated Crowdturfing Attacks and Defenses in Online Review Systems , 2017, CCS.

[42]  Hao Hu,et al.  Quantitative Method for Network Security Situation Based on Attack Prediction , 2017, Secur. Commun. Networks.

[43]  Yufen Li,et al.  Survey of Network Security Situation Awareness , 2017, ICCSE 2017.

[44]  Patricia Morreale,et al.  Scalable Agentless Cloud Network Monitoring , 2017, 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud).

[45]  Kelly M. T. Huffer,et al.  Situational awareness of network system roles (SANSR) , 2017, CISRC.

[46]  Steven McElwee,et al.  Active learning intrusion detection using k-means clustering selection , 2017, SoutheastCon 2017.

[47]  Giuseppe Ateniese,et al.  Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning , 2017, CCS.

[48]  Ying Tan,et al.  Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN , 2017, DMBD.

[49]  Marcus Pendleton,et al.  A Survey on Systems Security Metrics , 2016, ACM Comput. Surv..

[50]  Xiaoyan Sun,et al.  Enterprise-Level Cyber Situation Awareness , 2017, Theory and Models for Cyber Situation Awareness.

[51]  A. AdenusiDauda,et al.  Development of Threats Detection Model for Cyber Situation Awareness , 2017 .

[52]  John Yen,et al.  Studying Analysts' Data Triage Operations in Cyber Defense Situational Analysis , 2017, Theory and Models for Cyber Situation Awareness.

[53]  Nancy J. Cooke,et al.  Impact of Team Collaboration on Cybersecurity Situational Awareness , 2017, Theory and Models for Cyber Situation Awareness.

[54]  Sushil Jajodia,et al.  Theory and Models for Cyber Situation Awareness , 2017, Lecture Notes in Computer Science.

[55]  John Yen,et al.  Computer-Aided Human Centric Cyber Situation Awareness , 2017, Theory and Models for Cyber Situation Awareness.

[56]  Huaglory Tianfield Cyber Security Situational Awareness , 2016, 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[57]  Satish Vadlamani,et al.  Interdicting attack graphs to protect organizations from cyber attacks: A bi-level defender-attacker model , 2016, Comput. Oper. Res..

[58]  Tang Guangming,et al.  A network security situation assessment method based on attack intention perception , 2016, 2016 2nd IEEE International Conference on Computer and Communications (ICCC).

[59]  Mounir Ghogho,et al.  Deep learning approach for Network Intrusion Detection in Software Defined Networking , 2016, 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM).

[60]  Teemu Kanstrén,et al.  A Study on the State of Practice in Security Situational Awareness , 2016, 2016 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C).

[61]  Stefan Schauer,et al.  Threat awareness for critical infrastructures resilience , 2016, 2016 8th International Workshop on Resilient Networks Design and Modeling (RNDM).

[62]  Naoki Hayashi,et al.  Proposal and Evaluation of Cyber Defense System Using Blacklist Refined Based on Authentication Results , 2016, 2016 19th International Conference on Network-Based Information Systems (NBiS).

[63]  Fan Zhang,et al.  Stealing Machine Learning Models via Prediction APIs , 2016, USENIX Security Symposium.

[64]  Xin Yao,et al.  A Survey on Evolutionary Computation Approaches to Feature Selection , 2016, IEEE Transactions on Evolutionary Computation.

[65]  Akhilesh Tyagi,et al.  Voice Based User-Device Physical Unclonable Functions for Mobile Device Authentication , 2016, 2016 IEEE Computer Society Annual Symposium on VLSI (ISVLSI).

[66]  Florian Skopik,et al.  A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing , 2016, Comput. Secur..

[67]  Ian Goodfellow,et al.  Deep Learning with Differential Privacy , 2016, CCS.

[68]  Wang Xing-zhu Network Information Security Situation Assessment Based on Bayesian Network , 2016 .

[69]  Mansoor Alam,et al.  A Deep Learning Approach for Network Intrusion Detection System , 2016, EAI Endorsed Trans. Security Safety.

[70]  Yuan Liu,et al.  Network security risk assessment method based on HMM and attack graph model , 2016, 2016 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD).

[71]  Howon Kim,et al.  Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection , 2016, 2016 International Conference on Platform Technology and Service (PlatCon).

[72]  Mourad Debbabi,et al.  Darknet as a Source of Cyber Intelligence: Survey, Taxonomy, and Characterization , 2016, IEEE Communications Surveys & Tutorials.

[73]  Ravishankar K. Iyer,et al.  Game Theory with Learning for Cyber Security Monitoring , 2016, 2016 IEEE 17th International Symposium on High Assurance Systems Engineering (HASE).

[74]  Ananthram Swami,et al.  The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[75]  Ananthram Swami,et al.  Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks , 2015, 2016 IEEE Symposium on Security and Privacy (SP).

[76]  Ulrik Franke,et al.  Cyber Situational Awareness Testing , 2016 .

[77]  Yong Wang,et al.  A Big Network Traffic Data Fusion Approach Based on Fisher and Deep Auto-Encoder , 2016, Inf..

[78]  Hou Di,et al.  Network security situation evaluation method based on attack intention recognition , 2015, 2015 4th International Conference on Computer Science and Network Technology (ICCSNT).

[79]  Giuseppe Santucci,et al.  PERCIVAL: proactive and reactive attack and response assessment for cyber incidents using visual analytics , 2015, 2015 IEEE Symposium on Visualization for Cyber Security (VizSec).

[80]  Diane Staheli,et al.  Unlocking user-centered design methods for building cyber security visualizations , 2015, 2015 IEEE Symposium on Visualization for Cyber Security (VizSec).

[81]  Ouissem Ben Fredj A realistic graph-based alert correlation system , 2015, Secur. Commun. Networks.

[82]  M. E. Kabay,et al.  Writing Secure Code , 2015 .

[83]  Vitaly Shmatikov,et al.  Privacy-preserving deep learning , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[84]  David Slater,et al.  Malicious Behavior Detection using Windows Audit Logs , 2015, AISec@CCS.

[85]  Erik Blasch,et al.  Review of game theory applications for situation awareness , 2015, Defense + Security Symposium.

[86]  Fuchun Sun,et al.  Data Fusion-based resilient control system under DoS attacks: A game theoretic approach , 2015 .

[87]  Selvakumar Manickam,et al.  Network Security Situation Prediction: A Review and Discussion , 2015, SOCO 2015.

[88]  Florian Skopik,et al.  Cyber situational awareness through network anomaly detection: state of the art and new approaches , 2015, e & i Elektrotechnik und Informationstechnik.

[89]  Giovanni Felici,et al.  Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers , 2013, Int. J. Secur. Networks.

[90]  Tanja Zseby,et al.  Analysis of network traffic features for anomaly detection , 2014, Machine Learning.

[91]  Daniel A. Keim,et al.  NStreamAware: real-time visual analytics for data streams to enhance situational awareness , 2014, VizSec '14.

[92]  Ulrik Franke,et al.  Cyber situational awareness - A systematic review of the literature , 2014, Comput. Secur..

[93]  Graeme G. Shanks,et al.  A situation awareness model for information security risk management , 2014, Comput. Secur..

[94]  Dong Yu,et al.  Deep Learning: Methods and Applications , 2014, Found. Trends Signal Process..

[95]  Mohammad S. Obaidat,et al.  Honeypots deployment for the analysis and visualization of malware activity and malicious connections , 2014, 2014 IEEE International Conference on Communications (ICC).

[96]  Ankit D. Patel,et al.  Dynamic & hybrid honeypot model for scalable network monitoring , 2014, International Conference on Information Communication and Embedded Systems (ICICES2014).

[97]  Moises Sudit,et al.  Attack Projection , 2014, Cyber Defense and Situational Awareness.

[98]  Krunal Panchal,et al.  Survey of Adaptive Resonance Theory Techniques in IDS , 2014 .

[99]  Shuyuan Jin,et al.  Predicting Network Security Situation Based on a Combination Model of Multiple Neural Networks , 2014, Int. J. Softw. Informatics.

[100]  Christopher G. Healey,et al.  Visualizations and Analysts , 2014, Cyber Defense and Situational Awareness.

[101]  Matthew C. Elder,et al.  NICE: Network Introspection by Collaborating Endpoints , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).

[102]  B. S. Manjunath,et al.  SigMal: a static signal processing based malware triage , 2013, ACSAC.

[103]  Alfredo De Santis,et al.  Network anomaly detection with the restricted Boltzmann machine , 2013, Neurocomputing.

[104]  Joon S. Park,et al.  Game theoretic attack analysis in Online Social Network (OSN) services , 2013, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).

[105]  Andrew Walenstein,et al.  VILO: a rapid learning nearest-neighbor classifier for malware triage , 2013, Journal of Computer Virology and Hacking Techniques.

[106]  Zhanghui Liu,et al.  Situation element extraction of network security based on Logistic Regression and Improved Particle Swarm Optimization , 2013, 2013 Ninth International Conference on Natural Computation (ICNC).

[107]  Glenn A. Fink,et al.  Gamification for Measuring Cyber Security Situational Awareness , 2013, HCI.

[108]  Simon N. Foley,et al.  MASON: Mobile autonomic security for network access controls , 2013, J. Inf. Secur. Appl..

[109]  Xin Liu,et al.  The network security situation predicting technology based on the small-world echo state network , 2013, 2013 IEEE 4th International Conference on Software Engineering and Service Science.

[110]  Genshe Chen,et al.  On detection and visualization techniques for cyber security situation awareness , 2013, Defense, Security, and Sensing.

[111]  Patrick Traynor,et al.  MAST: triage for market-scale mobile malware analysis , 2013, WiSec '13.

[112]  Chunlei Yang,et al.  A Strategy of Network Security Situation Autonomic Awareness , 2012 .

[113]  John R. Goodall,et al.  situ: Situational understanding and discovery for cyber attacks , 2012, IEEE VAST.

[114]  Jeffrey M. Bradshaw,et al.  Human-Agent Teamwork in Cyber Operations: Supporting Co-evolution of Tasks and Artifacts with Luna , 2012, MATES.

[115]  Mengjie Zhang,et al.  A Filter Approach to Multiple Feature Construction for Symbolic Learning Classifiers Using Genetic Programming , 2012, IEEE Transactions on Evolutionary Computation.

[116]  Xiang Cui,et al.  Network Security Situation Prediction Based on BP and RBF Neural Network , 2012, ISCTCS.

[117]  Jeffrey M. Bradshaw,et al.  Sol: An Agent-Based Framework for Cyber Situation Awareness , 2012, KI - Künstliche Intelligenz.

[118]  Enrico Bertini,et al.  StreamSqueeze: a dynamic stream visualization for monitoring of event data , 2012, Visualization and Data Analysis.

[119]  Yongzheng Zhang,et al.  CNSSA: A Comprehensive Network Security Situation Awareness System , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[120]  David Brumley,et al.  BitShred: feature hashing malware for scalable triage and semantic analysis , 2011, CCS '11.

[121]  B. S. Manjunath,et al.  Malware images: visualization and automatic classification , 2011, VizSec '11.

[122]  Mikel Izal,et al.  Botnet detection based on DNS records and active probing , 2011, Proceedings of the International Conference on Security and Cryptography.

[123]  Gabriel Ghinita,et al.  The optimization of situational awareness for insider threat detection , 2011, CODASPY '11.

[124]  Xin Wang,et al.  Security Situation Prediction Based on Dynamic BP Neural with Covariance , 2011 .

[125]  Heba F. Eid,et al.  Hybrid Intelligent Intrusion Detection Scheme , 2011 .

[126]  Zhang Hong Network Security Situation Prediction Model Based on HHGA-RBF Neural Network , 2011 .

[127]  Tan Xiao Network Security Situation Awareness Approach Based on Markov Game Model , 2011 .

[128]  Qing Song,et al.  Survey on Network Security Situation Awareness , 2011 .

[129]  Achieving Cyber Survivability in a Contested Environment Using a Cyber Moving Target , 2011 .

[130]  Vinod Yegneswaran,et al.  Employing Honeynets For Network Situational Awareness , 2010, Cyber Situational Awareness.

[131]  Niki Pissinou,et al.  Belief-free equilibrium of packet forwarding game in ad hoc networks under imperfect monitoring , 2010, International Performance Computing and Communications Conference.

[132]  John Yen,et al.  Cyber SA: Situational Awareness for Cyber Defense , 2010, Cyber Situational Awareness.

[133]  Qiang Yang,et al.  A Survey on Transfer Learning , 2010, IEEE Transactions on Knowledge and Data Engineering.

[134]  Adam Wynne,et al.  Real-time visualization of network behaviors for situational awareness , 2010, VizSec '10.

[135]  Wang Huiqiang,et al.  Dynamic awareness of network security situation based on stochastic game theory , 2010, The 2nd International Conference on Software Engineering and Data Mining.

[136]  Xiaoqi Jia,et al.  Cross-Layer Damage Assessment for Cyber Situational Awareness , 2010, Cyber Situational Awareness.

[137]  John Yen,et al.  RPD-based Hypothesis Reasoning for Cyber Situation Awareness , 2010, Cyber Situational Awareness.

[138]  Thomas G. Dietterich,et al.  Machine Learning Methods for High Level Cyber Situation Awareness , 2010, Cyber Situational Awareness.

[139]  John Langford,et al.  Hash Kernels for Structured Data , 2009, J. Mach. Learn. Res..

[140]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[141]  Sudhir Aggarwal,et al.  Password Cracking Using Probabilistic Context-Free Grammars , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[142]  Grant Vandenberghe Network Traffic Exploration Application: A Tool to Assess, Visualize, and Analyze Network Security Events , 2008, VizSEC.

[143]  Richard Lippmann,et al.  GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool , 2008, VizSEC.

[144]  Marc Dacier,et al.  A framework for attack patterns' discovery in honeynet data , 2008 .

[145]  Yoshua Bengio,et al.  Classification using discriminative restricted Boltzmann machines , 2008, ICML '08.

[146]  Guolong Chen,et al.  PSO-BPNN-Based Prediction of Network Security Situation , 2008, 2008 3rd International Conference on Innovative Computing Information and Control.

[147]  Ying Liang,et al.  Stochastic Game Theoretic Method of Quantification for Network Situational Awareness , 2008, 2008 International Conference on Internet Computing in Science and Engineering.

[148]  Yan Chen,et al.  Honeynet-based Botnet Scan Traffic Analysis , 2008, Botnet Detection.

[149]  Ying Liang,et al.  Quantification of Network Security Situational Awareness Based on Evolutionary Neural Network , 2007, 2007 International Conference on Machine Learning and Cybernetics.

[150]  Colin R. Reeves,et al.  Evolutionary computation: a unified approach , 2007, Genetic Programming and Evolvable Machines.

[151]  Toby Segaran,et al.  Programming Collective Intelligence , 2007 .

[152]  Erik Blasch,et al.  A Markov game theoretic data fusion approach for cyber situational awareness , 2007, SPIE Defense + Commercial Sensing.

[153]  Richard Lippmann,et al.  An Interactive Attack Graph Cascade and Reachability Display , 2007, VizSEC.

[154]  Christopher M. Bishop,et al.  Pattern Recognition and Machine Learning (Information Science and Statistics) , 2006 .

[155]  H. Abdi,et al.  Multiple Correspondence Analysis , 2006 .

[156]  William Yurcik,et al.  The design of VisFlowConnect-IP: a link analysis system for IP security situational awareness , 2005, Third IEEE International Workshop on Information Assurance (IWIA'05).

[157]  Malcolm I. Heywood,et al.  Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 , 2005, PST.

[158]  R. Vaarandi Tools and Techniques for Event Log Analysis , 2005 .

[159]  Karen Spärck Jones A statistical interpretation of term specificity and its application in retrieval , 2021, J. Documentation.

[160]  William Yurcik,et al.  NVisionIP: netflow visualizations of system state for security situational awareness , 2004, VizSEC/DMSEC '04.

[161]  Niels Provos,et al.  A Virtual Honeypot Framework , 2004, USENIX Security Symposium.

[162]  Peter Dayan,et al.  Q-learning , 1992, Machine Learning.

[163]  Andrew H. Sung,et al.  Intrusion detection using neural networks and support vector machines , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).

[164]  Fabio A. González,et al.  An immunity-based technique to characterize intrusions in computer networks , 2002, IEEE Trans. Evol. Comput..

[165]  Alfonso Valdes,et al.  Adaptive, Model-Based Monitoring for Cyber Attack Detection , 2000, Recent Advances in Intrusion Detection.

[166]  Thorsten Joachims,et al.  Transductive Inference for Text Classification using Support Vector Machines , 1999, ICML.

[167]  Russell C. Eberhart,et al.  A new optimizer using particle swarm theory , 1995, MHS'95. Proceedings of the Sixth International Symposium on Micro Machine and Human Science.

[168]  Mica R. Endsley,et al.  Measurement of Situation Awareness in Dynamic Systems , 1995, Hum. Factors.

[169]  Kurt Hornik,et al.  Multilayer feedforward networks are universal approximators , 1989, Neural Networks.

[170]  Mica R. Endsley,et al.  Design and Evaluation for Situation Awareness Enhancement , 1988 .