J. Biskup, B. Hämmerli, M. Meier, S. Schmerl, J. Tölle et al., working group-early warning systems, InProceedings biskup et al, p.1493, 2008.

C. Lee, L. Yi, L. H. Tan, W. Goh, B. S. Lee et al., A Wavelet Entropy-Based Change Point Detection on Network Traffic: A Case Study of Heartbleed Vulnerability, 2014 IEEE 6th International Conference on Cloud Computing Technology and Science, pp.995-1000, 2014.
DOI : 10.1109/CloudCom.2014.78

Z. Durumeric, J. Kasten, D. Adrian, J. A. Halderman, M. Bailey et al., The Matter of Heartbleed, Proceedings of the 2014 Conference on Internet Measurement Conference, IMC '14, pp.475-488, 2014.
DOI : 10.1145/2663716.2663755

K. Cho, K. Mitsuya, and A. Kato, Traffic data repository at the wide project, Proceedings of the Annual Conference on USENIX Annual Technical Conference. ATEC '00, pp.51-51, 2000.

H. Kalutarage, S. Shaikh, C. Lee, and F. Sung, Towards an Early Warning System for Network Attacks Using Bayesian Inference, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing, pp.399-404, 2015.
DOI : 10.1109/CSCloud.2015.35

URL : https://curve.coventry.ac.uk/open/items/32435e13-d633-46c8-921f-1cbf6671753d/1/CSCloud_2015_PostReview.pdf

M. Robinson, K. Jones, and H. Janicke, Cyber warfare: Issues and challenges, Computers & Security, vol.49, pp.70-94, 2015.
DOI : 10.1016/j.cose.2014.11.007

A. Sharma, R. Gandhi, W. Mahoney, W. Sousan, and Q. Zhu, Building a Social Dimensional Threat Model from Current and Historic Events of Cyber Attacks, 2010 IEEE Second International Conference on Social Computing, pp.981-986, 2010.
DOI : 10.1109/SocialCom.2010.145

H. K. Kalutarage, S. A. Shaikh, I. P. Wickramasinghe, Q. Zhou, and A. E. James, Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks, Computers & Electrical Engineering, vol.47, pp.47-327, 2015.
DOI : 10.1016/j.compeleceng.2015.07.007

H. Kalutarage, Effective monitoring of slow suspicious activites on computer networks, 2013.

K. Dempsey, Information security continuous monitoring (ISCM) for federal information systems and organizations, 2011.
DOI : 10.6028/NIST.SP.800-137

C. C. Zou, L. Gao, W. Gong, and D. Towsley, Monitoring and early warning for internet worms, Proceedings of the 10th ACM conference on Computer and communication security , CCS '03, pp.190-199, 2003.
DOI : 10.1145/948109.948136

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.7686

M. Apel, J. Biskup, U. Flegel, and M. Meier, Towards Early Warning Systems ??? Challenges, Technologies and Architecture, Critical Information Infrastructures Security, pp.151-164, 2010.
DOI : 10.1007/978-3-642-14379-3_13

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.572.4677

E. Magkos, M. Avlonitis, P. Kotzanikolaou, and M. Stefanidakis, Toward early warning against Internet worms based on critical-sized networks, Security and Communication Networks, vol.3, issue.2-3, pp.78-88, 2013.
DOI : 10.1002/sec.534

S. Kollias, V. Vlachos, A. Papanikolaou, P. Chatzimisios, C. Ilioudis et al., Measuring the Internet's threat level: A global-local approach, 2014 IEEE Symposium on Computers and Communications (ISCC), pp.1-6, 2014.
DOI : 10.1109/ISCC.2014.6912624

U. Franke and J. Brynielsson, Cyber situational awareness ??? A systematic review of the literature, Computers & Security, vol.46, pp.18-31, 2014.
DOI : 10.1016/j.cose.2014.06.008

P. Harmer, R. Thomas, B. Christel, R. Martin, and C. Watson, Wireless security situation awareness with attack identification decision support, 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS), pp.144-151, 2011.
DOI : 10.1109/CICYBS.2011.5949399

D. King, G. Orlando, and J. Kohler, A case for trusted sensors: Encryptors with Deep Packet Inspection capabilities, MILCOM 2012, 2012 IEEE Military Communications Conference, pp.1-6, 2012.
DOI : 10.1109/MILCOM.2012.6415703

H. He, W. Xiaojing, and Y. Xin, A decision-support model for information systems based on situational awareness, Multimedia Information Networking and Security , 2009. MINES '09. International Conference on, pp.405-408, 2009.

Y. Cheng, Y. Sagduyu, J. Deng, J. Li, and P. Liu, Integrated situational awareness for cyber attack detection, analysis, and mitigation, Sensors and Systems for Space Applications V, pp.83850-83850, 2012.
DOI : 10.1117/12.919261

J. Preden, L. Motus, M. Meriste, and A. Riid, Situation awareness for networked systems, 2011 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), pp.123-130, 2011.
DOI : 10.1109/COGSIMA.2011.5753430

C. V. Zhou, C. Leckie, and S. Karunasekera, A survey of coordinated attacks and collaborative intrusion detection, Computers & Security, vol.29, issue.1, pp.124-140, 2010.
DOI : 10.1016/j.cose.2009.06.008

M. Bailey, E. Cooke, F. Jahanian, J. Nazario, and D. Watson, The internet motion sensor-a distributed blackhole monitoring system Symantec: Cyber security: Deepsight intelligence, In: NDSS, vol.25, 2005.

B. Grobauer, J. I. Mehlau, and J. Sander, Carmentis: A co-operative approach towards situation awareness and early warning for the internet, In: IMF, pp.55-66, 2006.

Y. Elovici, A. Shabtai, R. Moskovitch, G. Tahan, and C. Glezer, Applying machine learning techniques for detection of malicious code in network traffic Advances in Artificial Intelligence, pp.44-50, 2007.

K. Bsufka, O. Kroll-peters, and S. Albayrak, Intelligent Network-Based Early Warning Systems, Critical Information Infrastructures Security, pp.103-111, 2006.
DOI : 10.1007/11962977_9

M. Brunner, H. Hofinger, C. Roblee, P. Schoo, and S. Todt, Anonymity and Privacy in Distributed Early Warning Systems, Critical Information Infrastructures Security, pp.81-92, 2011.
DOI : 10.1007/978-3-642-21694-7_7

R. Koch, M. Golling, and G. D. Rodosek, Evaluation of state of the art ids message exchange protocols, International Conference on Communication and Network Security (ICCNS), 2013.

A. Theilmann, Beyond centralism: The herold approach to sensor networks and early warning systems, Proceedings of First European Workshop of Internet Early Warning and Network Intelligence, 2010.

S. Aldosari and J. M. Moura, Detection in Sensor Networks: The Saddlepoint Approximation, IEEE Transactions on Signal Processing, vol.55, issue.1, pp.327-340, 2007.
DOI : 10.1109/TSP.2006.882104

J. Göbel and P. Trinius, Towards optimal sensor placement strategies for early warning systems, In: Sicherheit, pp.191-204, 2010.

P. K. Varshney, Distributed detection and data fusion, 1997.
DOI : 10.1007/978-1-4612-1904-0

T. Morris, L. Mayron, W. Smith, M. Knepper, R. Ita et al., A perceptuallyrelevant model-based cyber threat prediction method for enterprise mission assurance, Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), 2011 IEEE First International Multi-Disciplinary Conference on, pp.60-65, 2011.

H. Chivers, J. A. Clark, P. Nobles, S. A. Shaikh, and H. Chen, Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise, Information Systems Frontiers, vol.10, issue.1/2, pp.17-34, 2013.
DOI : 10.1007/s10796-010-9268-7

M. Sudit, A. Stotz, and M. Holender, Situational awareness of a coordinated cyber attack, Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, pp.114-129, 2005.
DOI : 10.1117/12.606980

S. Schreiber-ehle and W. Koch, The jdl model of data fusion applied x2014; a review paper, Sensor Data Fusion: Trends, Solutions, Applications (SDF), 2012 Workshop on, pp.116-119, 2012.

R. Paffenroth, P. Du-toit, R. Nong, L. Scharf, A. P. Jayasumana et al., Space-Time Signal Processing for Distributed Pattern Detection in Sensor Networks, Selected Topics in Signal Processing, pp.38-49, 2013.
DOI : 10.1109/JSTSP.2012.2237381

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.309.4864

M. L. Mathews, P. Halvorsen, A. Joshi, and T. Finin, A Collaborative Approach to Situational Awareness for CyberSecurity, Proceedings of the 8th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp.216-222, 2012.
DOI : 10.4108/icst.collaboratecom.2012.250794

F. L. Greitzer and D. A. Frincke, Combining traditional cyber security audit data with psychosocial data: towards predictive modeling for insider threat mitigation. In: Insider Threats in Cyber Security, pp.85-113, 2010.
DOI : 10.1007/978-1-4419-7133-3_5

K. Grothoff, M. Brunner, H. Hofinger, C. Roblee, and C. Eckert, problems in web-based open source information processing for it early warning, 2011.

D. Jonker, S. Langevin, P. Schretlen, and C. Canfield, Agile visual analytics for banking cyber “big data”, 2012 IEEE Conference on Visual Analytics Science and Technology (VAST), pp.299-300, 2012.
DOI : 10.1109/VAST.2012.6400507

L. Harrison, J. Laska, R. Spahn, M. Iannacone, E. Downing et al., situ: Situational understanding and discovery for cyber attacks, 2012 IEEE Conference on Visual Analytics Science and Technology (VAST), pp.307-308, 2012.
DOI : 10.1109/VAST.2012.6400503

W. W. Streilein, J. Truelove, C. R. Meiners, and G. Eakman, Cyber situational awareness through operational streaming analysis, 2011, MILCOM 2011 Military Communications Conference, pp.1152-1157, 2011.
DOI : 10.1109/MILCOM.2011.6127455

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.375.1974

S. Jajodia, S. Noel, P. Kalapa, M. Albanese, and J. Williams, Cauldron missioncentric cyber situational awareness with defense in depth, Military Communications Conference, pp.1339-1344, 2011.

D. Weber, Transforming traditional security strategies into an early warning system for advanced threats. http://www.emc.com/collateral/software/solution- overview/h11031-transforming-traditional-security-strategies-so.pdf, 2012.

J. Li, X. Ou, and R. Rajagopalan, Uncertainty and Risk Management in Cyber Situational Awareness, pp.51-68, 2010.
DOI : 10.1007/978-1-4419-0140-8_4

H. K. Kalutarage, S. A. Shaikh, Q. Zhou, and A. E. James, Monitoring for Slow Suspicious Activities Using a Target Centric Approach, pp.163-168, 2013.
DOI : 10.1007/978-3-642-45204-8_12

I. Markovsky, Low rank approximation: algorithms, implementation, applications, 2011.
DOI : 10.1007/978-1-4471-2227-2

B. Viswanath, M. A. Bashir, M. Crovella, S. Guha, K. P. Gummadi et al., Towards detecting anomalous user behavior in online social networks, Proceedings of the 23rd USENIX Security Symposium (USENIX Security), 2014.

H. K. Kalutarage, S. A. Shaikh, Q. Zhou, and A. E. James, Sensing for suspicion at scale: A bayesian approach for cyber conflict attribution and reasoning, Cyber Conflict (CYCON), 2012 4th International Conference on, pp.1-19, 2012.

S. A. Shaikh and H. K. Kalutarage, Effective network security monitoring: from attribution to target-centric monitoring, Telecommunication Systems, vol.17, issue.2, pp.1-12, 2015.
DOI : 10.1007/s11235-015-0071-0