L. A. Petersen and H. Singh, “Understanding diagnostic errors in medicine: a lesson from aviation,” Qual Saf Health Care, vol.15, no. 3, pp. 159-164, Jun 2006.
B. Saili Waichal, “Router Attacks-Detection And Defense Mechanisms,” International Journal of Scientific & Technology Research, vol. 2, Issue 6, June 2013.
C. Kanich, K. Levchenko, B. Enright, G. M. Voelker, and S. Savage, “The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff,” University of California, San Diego, 2008.
C. Bannwart, “Predicting the Impact of Denial of Service Attacks,” August 2012.
C. Rossow, H. Bos, and A. Welzel, “On Measuring the Impact of DDoS Botnets,” EuroSec’14, Amsterdam, Netherlands, April 2014.
K. Kumar, M. Sachdeva, and K. Arora, “Impact Analysis of Recent DDoS Attacks,” International Journal on Computer Science and Engineering (IJCSE), ISSN : 0975-3397, vol. 3 no. 2, Feb. 2011.
D. Shen, G. Chen, J. B. Cruz, Jr., L. Haynes, M. Kruger, and E. Blasch, “A markov game theoretic data fusion approach for cyber situational awareness,” Defense and Security Symposium, International Society for Optics and Photonics, p. 65710F, April 2007.
Z. Peng, W. Zhao, and J. Long, “Grey synthetic clustering method for DoS attack effectiveness evaluation,” International Conference on Modeling Decisions for
Artificial Intelligence, Springer Berlin Heidelberg, pp. 139-149, July 2011.
L. J. Zhang, Y. Cao, and Q. X. Wang, “A DoS attack effect evaluation method based on multi-source data fusion,” Communications and Mobile Computing (CMC), 2010 International Conference on, vol. 1, pp. 91-96, IEEE, 2010.
A. K. Igor kotenko and A. Shorov, “Agent based modeling & simulation of botnets and botnet defense,” Academic of sciences, Conference of cyber conflict proceeding, Petersburg, Russia, 2010.
J. J. Aleman, “A Data Fusion Model for Ambient Assisted Living,” Volume 616 of the series Communications in Computer and Information Science, pp. 301-312, May 2016.
N. A. Giacobe, “Application of the JDL Data Fusion Process Model for Cyber Security,” Proceedings of SPIE, The International Society for Optical Engineering 7710, April 2010.
J. A. Rashidi and D. Khalil Nejad, “Concepts, theories and applications of data integration,” Malek Ashtar University of Technology, ISBN: 978-600-7736-14-2, 2016. (In Persian)
S. A. M. Rizvi and S. K. Malik, “Ontology design and development using ontology editors along with semantic search patterns towards intelligent retrieval of information on web: case studies,” Journal International Journal of Autonomic Computing archive, vol. 2, Issue 1, February 2014.
F. S. Yuan Yuan, “Data Fusion-based Resilient Control System under DoS Attacks: A Game Theoretic Approach,” International Journal of Control Automation and Systems, vol. 13, no. 3, June 2015.
M. R. Endsley, “Final Reflections: Situation Awareness Models and Measures,” Journal of Cognitive Engineering and Decision Making, March 2015.
M. Brunelli, “Introduction to the Analytic Hierarchy Process,” Springer Briefs in Operations Research, P. 83, 2015. 978-3-319-12502-2 (electronic), 10.1007/978-3-319-12502-2.
T. Min, “QoS integration in Web services with the WS-QoS framework,” Doctoral thesis, p. 74, 2010.
M. H. Hamza Kalai and M. R. M. J. shaman, “IP optimization ant colony algorithm for tracking denial of service attacks,” Journal of electronic and cyber defense, vol. 1, vol.4, 2014. (In Persian), IHU.AC.IR