[1] Cohen, F. "Simulating Cyber Attacks, Defences, And Consequences"; J. Com. Sec. 1999, 18, 479-518.##
[2] Park, J. S.; Lee, J.S.; Kim, H. K.; Jeong, J. R.; Yeom, D. B.; Chi, S. D. "Secusim: A Tool For The Cyber-Attack Simulation"; Proc. Int. Conf. Inf. Comm. Sec. 2001, 471-475.##
[3] Kotenko I.; Mankov E. "Experiments With Simulation Of Attacks Against Computer Networks"; Proc. Int. Conf. Math. Meth. Mod. Arch. Com. Net. Sec. 2003, 183-194.##
[4] Kuhl, M. E.; Kistner, J.; Costantini, K.; Sudit, M. "Cyber Attack Modeling And Simulation For Network Security Analysis"; Proc. Conf. Wint. Sim.2007, 1180-1188.##
[5] Gonsalves, P. G.; Dougherty, E. T. "Adaptive Cyber-Attack Modeling System" Sens. & C3I Tech. for Hom. Sec. & Def.2006, 62-104.##
[6] Cheung, S.; Lindqvist, U.; Fong, M. W.; "Modeling Multistep Cyber Attacks For Scenario Recognition"; Proc. DARPA Inf. Surv. Conf., 2003, 284-292.##
[7] Sudit, M.; Stotz, A.; Holender, M.; "Situational Awareness Of A Coordinated Cyber Attack"; Data Min. Intr. Det. Inf. Assur. & Data Net. Sec.2005, 114-129.##
[8] Costantini, K.; "Development Of A Cyber Attack Simulator For Network Modeling And Cyber Security Analysis"; Msc. Thesis, RIT university, Rochester, 2007.##
[9] Brown, B.; Cutts, A.; McGrath, D.; Nicol, D. M.; Smith, T. P.; Tofel, B.; "Simulation Of Cyber Attacks With Applications In Homeland Defense Training"; Sens. & C3I Tech. for Hom. Sec. & Def., 2003, 63-71.##
[10] Jajodia, S.; and Noel, S.; "Advanced Cyber Attack Modeling Analysis And Visualization"; George. Mason. Univ. Fairfax. Va., 2010.##
[11] Qin, X.; Lee, W.; "Attack Plan Recognition And Prediction Using Causal Networks"; Proc.Comp. Sec. App. Conf., 2004, 370-379.##
[12] Xie, P.; Li, J. H.; Ou, X.; Liu, P.; Levy, R.; "Using Bayesian Networks For Cyber Security Analysis"; Inter. Conf. Dep. Sys. & Net. (DSN), 2010, 211-220.##
[13] Stotz, A.; Sudit, M.; "Information Fusion Engine For Real-Time Decision-Making (INFERD): A Perceptual System For Cyber Attack Tracking"; Inter. Conf. Inf. Fus., 2007, 1-8.##
[14] Fava, D. S.; Byers, S. R.; Yang, S. J.; "Projecting Cyberattacks Through Variable-Length Markov Models"; J. IEEE. Trans. Inf. Forens. & Sec., 2008, 3, 359-369.##
[15] Abbasi, M.; A Azgomi, M.; "Simulation and Modeling Basis Agent of the Smarf DOS Cyber Attack Using Arena Simulation Software"; Proc. Conf. Com. Sci., 2016, (In Persian).##
[16] Rajaie, A.; "Security Assessment in Cloud Computing and Cyber Attack Simulation "; Proc. Conf. Elec. Bank. Pay. Sys., 2018, (In Persian).##
[17] Holsopple, J.; Yang, S. J.; "Fusia: Future Situation And Impact Awareness"; Inter. Conf. Inf. Fus., 2008, 1-8.##
[18] Zhang, Z.; Nait-Abdesselam, F.; Ho, P. H.; "Boosting Markov Reward Models For Probabilistic Security Evaluation By Characterizing Behaviors Of Attacker And Defender"; Inter. Conf. Avail. Reli. & Sec., 2008, 352-359.##
[19] Wang, B.; Cai, J.; Zhang, S.; Li, J.; "A Network Security Assessment Model Based On Attack-Defense Game Theory"; Inter. Conf. Comp. App. & Sys. Mod., 2010, 639- 643.##
[20] Canadas, N.; Machado, J.; Soares, F.; Barros, C.; Varela, L.; "Simulation Of Cyber Physical Systems Behaviour Using Timed Plant Models"; J. Mechatronics., 2018, 54, 175-185.##
[21] Brandstetter V.; Wehrstedt, J. C.; "A Framework For Multidisciplinary Simulation Of Cyber-Physical Production Systems" J. IFAC, 2018, 51, 809-814.##
[22] Kour, R.; Thaduri, A.; Karim R; "Predictive model for multistage cyber-attack simulation"; Int. J. Syst. Assur. Eng. Manag, 2020, 1-14.##
[23] Aggarwal, P.; Gonzalez, C.; Dutt, V.; "HackIt: A Real-Time Simulation Tool for Studying Real-World Cyberattacks in the Laboratory"; Springer International Publishing: Cham, 2020.##
[24] Mayfield, K.P.; Petty, M.D.; Whitaker, T.S.; Cantrell, W.A.; Hice, S.M.; McClendon, J.; Reyes, P.J.; "Component Selection Process in Assembling Cyberattack Simulation Models"; Proc. Int. Conf. Sec. & Manag. 2019, 168-174.##
[25] Mayfield, K.P.; Petty, M.D.; Whitaker, T.S.; Bland, J.A.; Cantrell, W.A.; "Component-based implementation of cyberattack simulation models", Proc. ACM. Conf. 2019, 64-71.##
[26] Heidarpour, M.; Rashidi, A. J.; Ahmadi, K. D.; "Cyber Situational Awareness Using Intelligent Information Fusion Engine"; J. Sci., 2015, 36, 3218-3229.##
[27] Rashidi, A. J.; Jafari, M.; Ahmadi, K. D.; "Projection Of Cyber Attacks By Damage Estimation And Combining Capability And Opportunity Based On Transferable Belief Model"; J. Elec. & Cyb. Def., 2019, 6, 1-12.##
[28] Zalta, E. N. "Bayes Theorem"; https://plato.stanford.edu/archives/spr2019/entries/bayes-theorem/, 2019.##