[1] A. Kott, C. Wang, and R. F. Erbacher, “Cyber defense and situational awareness,” vol. 62, Springer, 2015.##
[2] A. Veeraswamy, S. Appavu, and E. Kannan, “An Implementation of Efficient Datamining Classification Algorithm using Nbtree,” International Journal of Computer Applications, 2013.##
[3] F. Valeur, et al., “Comprehensive approach to intrusion detection alert correlation,” IEEE Transactions on dependable and secure computing, pp. 146-169, 2004.##
[4] S. Ruggieri, “Efficient C4. 5 [classification algorithm] transactions on knowledge and data engineering,” IEEE, vol. 14, no. 2, pp. 438-444, 2002.##
[5] A. Kott, C. Wang, and R. F. Erbacher, “Cyber defense and situational awareness,” Springer, vol. 62, 2015.##
[6] H. Du and S. J. Yang, “Probabilistic inference for obfuscated network attack sequences,” Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014.#
[7] H. Debar and M. Dacier, “Towards a taxonomy of intrusion-detection systems,” Computer Networks, vol. 31, no. 8, pp. 805–822, 1999.##
[8] S. Parsa, H. salehi, and M. H. Alaeiyan, “Code Obfuscation to Prevent Symbolic Execution,” Journal of Electoronic & Cyber defence, Imam Hossein Comprhensive Univercity, vol. 6, no. 1, 2018.)In persian)##
[9] M. H. Najari, “The design and simulation of an efficient algorithm for modeling the obfuscation of cyber attacks based on action insertion,” M.Sc, Malek-e-Ashtar University, 2017. (In persian)##
[10] N. Ghafori, “The design and simulation of an efficient algorithm for modeling the obfuscation of cyber attacks based on action alteration,” M.Sc, Malek-e-Ashtar University, 2017. (In persian)##
[11] R. Aliabadi, “The design and simulation of an efficient algorithm for modeling the obfuscation of cyber attacks based on action removal,” M.Sc, Malek-e-Ashtar University, 2017 .(In persian)##
[12] H. Du, “Probabilistic Modeling and Inference for Obfuscated Network Attack Sequences,” PhD diss, Rochester, New York, 8-2014.##
[13] L. Wang, A. Liu, and S. Jajodia, “Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts,” Comput. Commun, vol. 29, no. 15, pp. 2917–2933, 2006.##
[14] C. Phillips and L. P. Swiler, “A graph-based system for network-vulnerability analysis,” presented at the Proceedings of the 1998 workshop on new security paradigms, pp. 71–79, 1998.##
[15] T. Tidwell, R. Larson, K. Fitch, and J. Hale, “Modeling internet attacks,” presented at the Proceedings of the IEEE Workshop on Information Assurance and security, vol. 59, 2001.##
[16] K. Daley, R. Larson, and J. Dawkins, “A structural framework for modeling multi-stage network attacks,” Presented at the Parallel Processing Workshops, Proceedings, International Conference on, pp. 5–10, 2002.##
[17] S. Noel and S. Jajodia, “Advanced vulnerability analysis and intrusion detection through predictive attack graphs,” Crit. Issues C4I Armed Forces Commun. Electron. Assoc. AFCEA Solut. Ser. Int. J. Command Control, 2009.##
[18] “Common Attack Pattern Enumeration and Classification (CAPEC) Schema Description,” 2019.##
[19] K. Shoushian, A. J. Rashidi, and M. Dehghani, “Modeling of cyber attacks obfuscation based insertion technique of attack,” Journal of Electoronic & Cyber defence, Imam Hossein Comprhensive Univercity(printing ), (In persian).##