H Zhang, Y Yi, J Wang, N Cao… - Computers, Materials & …, 2018 - researchgate.net
… network security situation of the cloud environment based on the game process of both attack
and defense. In attack prediction, cyber threat intelligence … methods in these two situations. …