M. G. Pérez, F. Gómez-mármol, G. M. Pérez, and A. F. Skarmeta, RepCIDN: A Reputation-based Collaborative Intrusion Detection Network to Lessen the Impact of Malicious Alarms, Journal of Network and Systems Management, vol.19, issue.1, pp.128-167, 2013.
DOI : 10.1007/s10922-012-9230-8

M. Robinson, K. Jones, and H. Janicke, Cyber warfare: Issues and challenges, Computers & Security, vol.49, pp.70-94, 2015.
DOI : 10.1016/j.cose.2014.11.007

N. Poolsappasit, R. Dewri, and I. Ray, Dynamic Security Risk Management Using Bayesian Attack Graphs, IEEE Transactions on Dependable and Secure Computing, vol.9, issue.1, pp.61-74, 2012.
DOI : 10.1109/TDSC.2011.34

S. Abraham and S. Nair, A Predictive Framework For Cyber Security Analytics Using Attack Graphs, International journal of Computer Networks & Communications, vol.7, issue.1, pp.1-17, 2015.
DOI : 10.5121/ijcnc.2015.7101

R. Zuech, T. M. Khoshgoftaar, and R. Wald, Intrusion detection and Big Heterogeneous Data: a Survey, Journal of Big Data, vol.20, issue.3, pp.1-41, 2015.
DOI : 10.1186/s40537-015-0013-4

C. Goodwin and J. P. Nicholas, A framework for cybersecurity information sharing and risk reduction, 2015.

F. Skopik, G. Settanni, and R. Fiedler, A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing, Computers & Security, vol.60, 2016.
DOI : 10.1016/j.cose.2016.04.003