[1] F. Iserhani, et al., “MARS: multi-stage attack recognition system,” in 24th IEEE International Conference on Advanced Information Networking and Applications, 2010.##
[2] S. T. Eckmann, G. Vigna, and R. A. Kemmerer, “STATL: An attack language for state-based intrusion detection,” Journal of computer security, pp. 71-103, 2002.##
[3] K. K. Thompson, “Not like an Egyptian: Cybersecurity and the Internet kill switch debate,” p. 465, 2011.##
[4] P. Disso and F. Jules, “A novel intrusion detection system (IDS) architecture,” Attack detection based on snort for multistage attack scenarios in a multi-cores environment, University of Bradford, 2011.##
[5] S. Noel and S. Jajodia, “Optimal ids sensor placement and alert prioritization using attack graphs,” Journal of Network and Systems Management, pp. 259-275, 2008.##
[6] H. Du, “Probabilistic Modeling and Inference for Obfuscated Network Attack Sequences,” 2014.##
[7] H. Du and S. J. Yang, “Sequential modeling for obfuscated network attack action sequences,” in IEEE Conference on Communications and Network Security (CNS), 2013.##
[8] R.Goyal, et al., “Obfuscation of stuxnet and flame malware. Latest Trends in Applied Informatics and Computing,” pp. 150-154, 2012.##
[9] S. Andersson, A. J. Clark, and G. M. Mohay, “Detecting network-based obfuscated code injection attacks using sandboxing,” 2005.##
[10] B. Barak, et al., “On the (im) possibility of obfuscating programs. Journal of the ACM (JACM),” 2012.##
[11] S. Parsa, H. salehi, M. H. Alaeiyan, “Code Obfuscation to Prevent Symbolic Execution,” Journal of Electoronic & Cyber defence, Imam Hossein Comprhensive Univercity, vol. 6, no. 1, 2018. (In Persion)##
[12] D. M. Farid and M. Z. Rahman, “Attribute weighting with adaptive NBTree for reducing false positives in intrusion detection,” 2010.##
[13] Mitre.org, Common Attack Pattern Enumeration and Classification (CAPEC) Schema Description, 2019.##
[14] M. H. Najari, “The design and simulation of an efficient algorithm for modeling the obfuscation of cyber attacks based on action insertion,” M.Sc, Malek-e-Ashtar University, 2017. (In Persion)##
[15] N. Ghafori, “The design and simulation of an efficient algorithm for modeling the obfuscation of cyber attacks based on action alteration,” M.Sc, Malek-e-Ashtar University, 2017. ( In Persion)##
[16] R. Aliabadi, “The design and simulation of an efficient algorithm for modeling the obfuscation of cyber attacks based on action removal,” M.Sc, Malek-e-Ashtar University, 2017. (In Persion)##