참고문헌
- Kuyoung Shin, Jinchel Yoo, Changhee Han, et al., "A study on building a cyber attack database using Open Source Intelligence(OSINT)", Convergence Security Journal 19(2), pp. 113-133, 2019.
- Sungrok Kang, Minam Moon, Kyuyoung Shin, Joogkwan Lee, "A study on Priority Analysis of Evaluation Factors for Cyber Threats using Open Source Intelligence(OSINT)", Convergence Security Journal 20(1), pp. 49-57, 2020.
- C. W. Geib and R. P. Goldman, "Plan recognition in intrusion detection systems," in DARPA Information Survivability Conference amp; Exposition II, 2001. DISCEX '01. Proceedings, 2001.
- A. A. Ahmed and N. A. K. Zaman, "Attack intention recognition: A review," IJ Network Security, vol. 19, no. 2, pp. 244-250, 2017.
- A. A. Ahmed and N. A. K. Zaman, "Attack intention recognition: A review," IJ Network Security, 2017.
- M. Abdlhamed, K. Kifayat, Q. Shi, and W. Hurst, "Intrusion Prediction Systems". Cham: Springer International Publishing, 2017.
- N. Polatidis, E. Pimenidis, M. Pavlidis, and H. Mouratidis, "Recommender systems meeting security: From product recommendation to cyber-attack prediction," in Engineering Applications of Neural Networks. Cham: Springer International Publishing, 2017.
- K. Huang, C. Zhou, Y. C. Tian, S. Yang, and Y. Qin, "Assessing the physical impact of cyberattacks on industrial cyber-physical systems," IEEE Transactions on Industrial Electronics, vol. 65, no. 10, 2018.
- A. Bar, B. Shapira, L. Rokach, and M. Unger, "Identifying Attack Propagation Patterns in Honeypots Using Markov Chains Modeling and Complex Networks Analysis," in Software Science, Technology and Engineering (SWSTE), 2016 IEEE International Conference on.IEEE, 2016.
- M. Abdlhamed, K. Kifayat, Q. Shi, and W. Hurst, "A system for intrusion prediction in cloud computing," in Proceedings of the International Conference on Internet of Things and Cloud Computing, ser. ICC '16.New York, NY, USA: ACM, 2016.
- G. Werner, S. Yang, and K. McConky, "Time series forecasting of cyber attack intensity," in Proceedings of the 12th Annual Conference on Cyber and Information Security Research, ser. CISRC '17. New York, NY, USA: ACM, 2017.
- Y.-B. Leau and S. Manickam, "A Novel Adaptive Grey Verhulst Model for Network Security Situation Prediction," International Journal of Advanced Computer Science & Applications, vol. 1, no. 7, 2016.
- F. He, Y. Zhang, D. Liu, Y. Dong, C. Liu, and C. Wu, "Mixed Wavelet-Based Neural Network Model for Cyber Security Situation Prediction Using MODWT and Hurst Exponent Analysis," in Network and System Security. Cham: Springer International Publishing, 2017.
- G. K. Jayasinghe, J. S. Culpepper, and P. Bertok, "Efficient and effective realtime prediction of drive-by download attacks," Journal of Network and Computer Applications, vol. 38, pp. 135-149, 2014. https://doi.org/10.1016/j.jnca.2013.03.009
- Y.-H. Kim and W. H. Park, "A study on cyber threat prediction based on intrusion detection event for apt attack detection," Multimedia Tools and Applications, vol. 71, no. 2, pp. 685-698, Jul 2014. https://doi.org/10.1007/s11042-012-1275-x
- Goodfellow, Ian, et al. "Deep learning," Vol. 1. Cambridge: MIT press, 2016.
- Abiodun, Oludare Isaac, et al. "State-of-the-art in artificial neural network applications: A survey." Heliyon, Vol. 4. No. 11, 2018.
- Wang, Lin, et al. "Optimal forecast combination based on neural networks for time series forecasting." Applied soft computing 66, pp. 1-17, 2018. https://doi.org/10.1016/j.asoc.2018.02.004
- Singh, Navneet, Asheesh Singh, and Manoj Tripathy. "Selection of hidden layer neurons and best training method for ffnn in application of long term load forecasting." Journal of electrical engineering, Vol. 63, No.3, pp. 153-16, 2012. https://doi.org/10.2478/v10187-012-0023-9