References
- S. Puri and M. Agnihotri, "A proactive approach for cyber attack mitigation in cloud network," in 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), 2017: IEEE, pp. 171-176.
- S. Panda, "GPS Hash Table Based Location Identifier Algorithm for Security and Integrity Against Vampire Attacks," in Cyber Security: Springer, 2018, pp. 81-89.
- G. Soni and R. Sudhakar, "A L-IDS against dropping attack to secure and improve RPL performance in WSN aided IoT," in 2020 7th International Conference on Signal Processing and Integrated Networks (SPIN), 2020: IEEE, pp. 377-383.
- S. W. Duxbury and D. L. J. C. Haynie, "Criminal network security: An agent-based approach to evaluating network resilience," vol. 57, no. 2, pp. 314-342, 2019. https://doi.org/10.1111/1745-9125.12203
- Y. Duan, Y. Cai, Z. Wang, and X. J. A. S. Deng, "A novel network security risk assessment approach by combining subjective and objective weights under uncertainty," vol. 8, no. 3, p. 428, 2018. https://doi.org/10.3390/app8030428
- S. Chapman, R. Smith, L. Maglaras, H. J. J. o. S. Janicke, and A. Networks, "Can a network attack be simulated in an emulated environment for network security training?," vol. 6, no. 3, p. 16, 2017. https://doi.org/10.3390/jsan6030016
- N. Saxena, S. Grijalva, V. Chukwuka, and A. V. J. I. W. C. Vasilakos, "Network security and privacy challenges in smart vehicle-to-grid," vol. 24, no. 4, pp. 88-98, 2017. https://doi.org/10.1109/MWC.2016.1600039WC
- L. Abualigah, M. Abd Elaziz, P. Sumari, Z. W. Geem, and A. H. Gandomi, "Reptile Search Algorithm (RSA): A nature-inspired metaheuristic optimizer," Expert Systems with Applications, vol. 191, p. 116158, 2022.
- F. Adriani and D. Ladley, "Social distance, speed of containment and crowding in/out in a network model of contagion," Journal of Economic Behavior & Organization, vol. 190, pp. 597-625, 2021. https://doi.org/10.1016/j.jebo.2021.08.003
- A. Fedele and C. Roner, "Dangerous games: A literature review on cybersecurity investments," Journal of Economic Surveys, vol. 36, no. 1, pp. 157-187, 2022. https://doi.org/10.1111/joes.12456
- S. Kar, S. Sethi, M. K. J. I. J. o. C. N. Bhuyan, and D. Systems, "Security challenges in cognitive radio network and defending against Byzantine attack: A survey," vol. 17, no. 2, pp. 120-146, 2016. https://doi.org/10.1504/IJCNDS.2016.079098
- S. Rathore, P. K. Sharma, V. Loia, Y.-S. Jeong, and J. H. J. I. s. Park, "Social network security: Issues, challenges, threats, and solutions," vol. 421, pp. 43-69, 2017. https://doi.org/10.1016/j.ins.2017.08.063
- D. Acemoglu, A. Malekian, and A. J. J. o. E. T. Ozdaglar, "Network security and contagion," vol. 166, pp. 536-585, 2016. https://doi.org/10.1016/j.jet.2016.09.009