References:
1) El-Bawab, A. E.-M. A. (2014). Untangle Network Security. Packt Publishing
2) Li, Z., Zhao, D., Li, X., & Zhang, H. (2021). Network security situation prediction based on feature separation and dual attention mechanism. EURASIP Journal on Wireless Communications & Networking, 2021(1), 1–19. https://doi.org/10.1186/s13638-021-02050-x
3) Nasir, A., Jan, N., Khan, S. U., Gumaei, A., & Alothaim, A. (2021). Analysis of Communication and Network Securities Using the Concepts of Complex Picture Fuzzy Relations. Computational Intelligence & Neuroscience, 1–20. https://doi.org/10.1155/2021/9427492
4) Zhu, Y., & Du, Z. (2021). Research on the Key Technologies of Network Security-Oriented Situation Prediction. Scientific Programming, 1–10. https://doi.org/10.1155/2021/5527746
5) ZAVE, P., & REXFORD, J. (2020). Paterns and Interactions in Network Security. ACM Computing Surveys, 53(6), 1–37. https://doi.org/10.1145/3417988
6) Wang, L., & Jones, R. (2021). Big Data Analytics in Cyber Security: Network Traffic and Attacks. Journal of Computer Information Systems, 61(5), 410–417. https://doi.org/10.1080/08874417.2019.1688731
7) Wang, Z., Ruan, Q., & Kim, Y. H. (2020). Research on network security subsystem based on digital signal. Journal of Intelligent & Fuzzy Systems, 38(1), 97–103. https://doi.org/10.3233/JIFS-179384
8) Alpcan, T., & Başar, T. (2011). Network Security : A Decision and Game-Theoretic Approach. Cambridge University Press.
9) Wang, Y. (2009). Statistical Techniques for Network Security : Modern Statistically-based Intrusion Detection and Protection. IGI Global.
10) López, J., & Zhou, J. (2008). Wireless Sensor Network Security. IOS Press.
11) Steve Manzuik, Ken Pfeil, & Andrew Gold. (2007). Network Security Assessment: From Vulnerability to Patch. Syngress.
12) Yi, B., Cao, Y. P., Song, Y., & Zhang, W. (2020). Network security risk assessment model based on fuzzy theory. Journal of Intelligent & Fuzzy Systems, 38(4), 3921–3928. https://doi.org/10.3233/JIFS-179617