N. Stakhanova, S. Basu, and J. Wong, “A Taxonomy of Intrusion Response Systems,” International Journal of Information and Computer Security, vol. 1, no. 1/2, pp. 169-184, 2007.
 A. A. Ghorbani, W. Lu, and M. Tavallaee, “Network Intrusion Detection and Prevention Concepts and Techniques,” Springer US, 2009.
 M. M. Siraj and S. Z. M. Hashim, “Modeling Intrusion Alerts using IDMEF Data Model,” University Technology of Malaysia, 2008.
 H. T. Elshousha and I. M. Osman, “Alert correlation in collaborative intelligent intrusion detection systems—A survey,” Appl. Soft Comput., vol. 11, pp. 4349–4365, 2011.
 K. A. Alsubhi, “A Fuzzy-logic based Alert Prioritization Engine for IDSs: Architecture and Configuration,” University of Waterloo, 2008.
 K. Alsubhi, I. Aib, and R. Boutaba, “FuzMet: a fuzzy‐logic based alert prioritization engine for intrusion detection systems,” Int J Netw Manag, vol. 22, no. 4, pp. 263-284, 2012.
 H. Q. Wang, G. F. Wang, Y. Lan et al., “A new automatic intrusion response taxonomy and its application,” in The 8th Asia-Pacific Web Conference and Workshops (APWeb 2006), Harbin, People R China, pp. 999-1003, 2006.
 A. Avizienis, J. C. Laprie, B. Randell et al., “Basic concepts and taxonomy of dependable and secure computing,” IEEE Trans Dependable Secure Comput, vol. 1, no. 1, pp. 11-33, 2004.
 G. Idowu, O. Enikuomehin, and S. Olasanoye, “Intrusion Response Systems: An Overview,” Asian Journal of Information Technology, vol. 10, no. 5, pp. 192-200, 2011.
 S. A. Zonouz, “Game-theoretic intrusion response and recovery,” University of Illinois at Urbana-Champaign, 2011.
 N. B. A. Jumaat, “Incident prioritisation for intrusion response systems,” Plymouth University, 2012.
 N. Stakhanova, S. Basu, and JohnnyWong, “A Cost-Sensitive Model for Preemptive Intrusion Response Systems,” in 21st International Conference on Advanced Networking and Applications, Niagara Falls, ON, Canada, pp. 428-435, 2007.
 B. Foo, Y.-S. Wu, Y.-C. Mao et al., “ADEPTS: Adaptive intrusion response using attack graphs in an e-commerce environment,” in The 2005 International Conference on Dependable Systems and Networks, Yokohama, Japan, pp. 508–517, 2005.
 M. E. Locasto, K. Wang, A. D. Keromytis et al., “FLIPS: Hybrid adaptive intrustion prevention,” in The 8th international conference on Recent Advances in Intrusion Detection (RAID), Seattle, WA, USA, pp. 82-101, 2005.
 K. Haslum, A. Abraham, and S. Knapskog, “DIPS : A framework for distributed intrusion prediction and prevention using hidden markov models and online fuzzy risk assessment,” in the 3rd International Symposium on Information Assurance and Security, Manchester, United Kingdom, pp. 183-188, 2007.
 Z. Zhang, P.-H. Ho, and L. He, “Measuring IDS-estimated attack impacts for rational incident response: A decision theoretic approach,” Comput. Secur., vol. 28, pp. 605-614, 2009.
 W. Kanoun, N. Cuppens-Boulahia, F. Cuppens, et al., “Risk-Aware Framework for Activating and Deactivating Policy-Based Response,” in The Fourth International Conference on Network and System Security, Melbourne, VIC, pp. 207-215, 2010.
 N. Kheir, N. Cuppens-Boulahia, F. Cuppens, et al., “A service dependency model for cost sensitive intrusion response,” in The 15th European Conference on Research in Computer Security, Athens, Greece, pp. 626-642, 2010.
 A. Shameli-Sendi, J. Desfossez, M. Dagenais, et al., “A Retroactive-Burst Framework for Automated Intrusion Response System,” Journal of Computer Networks and Communications, 2013.
 A. Shameli-Sendi, “System health monitoring and proactive response activation,” Université de Montréal, Canada, 2013.
 C. Mu and Y. Li, “An intrusion response decision-making model based on hierarchical task network planning,” Expert. Syst. Appl., vol. 37, no. 3, pp. 2465-2472, 2010.
 H. W. Njogu, L. Jiawei, J. N. Kiere, et al., “A comprehensive vulnerability based alert management approach for large networks,” Future Generat Comput. Syst., vol. 29, pp. 27-45, 2013.
 S. Parsa, H. Saifi, and M.-H. Alaeian, “Providing a New Approach to Discovering Malware Behavioral Patterns Based on the Dependency Graph Between System Calls,” Journal Of Electronical & Cyber Defence, vol. 4, no. 3, 2016 (In Persian).
 X. Ou, S. Govindavajhala, and A. W. Appel, “MulVAL: A Logic-based Network Security Analyzer,” in USENIX Security, 2005.
 K. Kaynar, “A taxonomy for attack graph generation and usage in network security,” Journal of Information Security and Applications, vol. 29, pp. 27-56, 2016.
 S. Wu, Y. Zhang, and W. Cao, “Network security assessment using a semantic reasoning and graph based approach,” Comput. Electr. Eng., 2017.
 H. Li, Y. Wang, and Y. Cao, “Searching Forward Complete Attack Graph Generation Algorithm Based on Hypergraph Partitioning,” Procedia Computer Science, vol. 107, pp. 27-38, 2017.
 M. Keramati, “Using Attack Graph for Improving Intrusion Response Systems in Computer Networks,” Iran University of Science and Technology, 2011. (In Persian).
 B. Gruschke, “Integrated event management: Event correlation using dependency graphs,” in Proceedings of the 9th IFIP/IEEE International Workshop on Distributed Systems: Operations & Management (DSOM 98), pp. 130-141, 1998.
 Y. Zhai, P. Ning, and J. Xu, “Integrating IDS Alert Correlation and OS-Level Dependency Tracking,” in The 4th IEEE international conference on Intelligence and Security Informatics, pp. 272-284, 2006.
 T. Toth, and C. Kruegel, “Evaluating the impact of automated intrusion response mechanisms,” in The 18th Annual Computer Security Applications Conference, Las Vegas, Nevada, pp. 301-310, 2002.
 I. Balepin, S. Maltsev, J. Rowe, et al., “Using specification-based intrusion detection for automated response,” in The 6th International Symposium on Recent Advances in Intrusion Detection (RAID), Pittsburgh, PA, USA, 2003.
 A. Shameli-Sendi, and M. Dagenais, “ORCEF: Online response cost evaluation framework for intrusion response system,” J. Netw. Comput. Appl., vol. 55, pp. 89-107, 2015.
 M. GhasemiGol and A. Ghaemi‐Bafghi, “E‐correlator: an entropy‐based alert correlation system,” Secur. Comm. Network, vol. 8, no. 5, pp. 822–836, 2015.
 M. Ester, H.-P. Kriegel, J. Sander, et al., “A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise,” in 2nd International Conference on Knowledge Discovery and Data Mining (KDD-96), 1996.
 K. Julisch, “Clustering intrusion detection alarms to support root cause analysis,” ACM Trans Inform Syst Secur, vol. 6, no. 4, pp. 443-471, 2003.
 M. GhasemiGol, A. Ghaemi-Bafghi, and H. Takabi, “A comprehensive approach for network attack forecasting,” Comput. Secur., vol. 58, pp. 83-105, 2016.
 M. GhasemiGol, H. Takabi, and A. Ghaemi-Bafghi, “A foresight model for intrusion response management,” Comput. Secur., vol. 62, pp. 73-94, 2016.
 T. L. Saaty, “Decision making with the analytic hierarchy process,” Int J Serv Sci, vol. 1, no. 1, pp. 83-98, 2008.