Skip to main content

Table 2 Mapping of theoretical background and reviewed methods

From: A survey of methods supporting cyber situational awareness in the context of smart cities

Theoretical background

Interdependency models

Risk assessment and threat intelligence

Attack detection

Deep autoencoder (DAE)

  

[81]

Deep Belief Networks (DBNs)

  

[77]

Convolutional network

  

[78]

Fuzzy pattern tree

  

[79]

Generative Adversarial Networks (GANs)

  

[85]

Gaussian Naive Bayes

  

[80]

Random Forest classifier

  

[80]

k-Nearest Neighbors

 

[68, 70]

[80, 86]

Graph theory

[48,49,50,51, 55, 57]

[58, 60, 62, 63, 67]

 

Game theory

[57]

  

Markov decision process/chain

[49]

[66]

 

State machine

[53, 54, 56]

  

Stochastic Activity Networks (SAN)

[52,53,54]

  

Stochastic Well-formed Nets (SWN)

[52]

  

Competing Risks Theory

[53]

  

Monte Carlo Simulation

[53]

  

Various data mining methods

 

[59, 65, 69, 71, 73, 75, 76]

[82]