From: A survey of methods supporting cyber situational awareness in the context of smart cities
Theoretical background | Interdependency models | Risk assessment and threat intelligence | Attack detection |
---|---|---|---|
Deep autoencoder (DAE) | Â | Â | [81] |
Deep Belief Networks (DBNs) | Â | Â | [77] |
Convolutional network | Â | Â | [78] |
Fuzzy pattern tree | Â | Â | [79] |
Generative Adversarial Networks (GANs) | Â | Â | [85] |
Gaussian Naive Bayes | Â | Â | [80] |
Random Forest classifier | Â | Â | [80] |
k-Nearest Neighbors | Â | ||
Graph theory | Â | ||
Game theory | [57] | Â | Â |
Markov decision process/chain | [49] | [66] | Â |
State machine | Â | Â | |
Stochastic Activity Networks (SAN) | Â | Â | |
Stochastic Well-formed Nets (SWN) | [52] | Â | Â |
Competing Risks Theory | [53] | Â | Â |
Monte Carlo Simulation | [53] | Â | Â |
Various data mining methods | Â | [82] |