[8]
A. J. Onwuegbuzie and R. Frels, Seven Steps to a Comprehensive Literature Review: A Multimodal and Cultural Approach. Los Angeles, CA, USA: SAGE Publications Ltd, 2016.
[9]
A. B. Downey, Think Complexity: Complexity Science and Computational Modeling, 2nd edition. Boston, MA, USA: O’Reilly Media, 2018.
[10]
B. Castellani and F. W. Hafferty, Sociology and Complexity Science: A New Field of Inquiry. Berlin, Germany: Springer Berlin Heidelberg, 2009.
[11]
L. Von Bertalanffy, General System Theory: Foundations, Development, Applications, Revised edition. New York, NY, USA: George Braziller Inc., 1968.
[12]
N. Wiener, Cybernetics: Or Control and Communication in the Animal and the Machine (Second Edition). Cambridge, MA, USA: MIT Press, 1948.
[13]
B. Macukow, Neural networks–State of art, brief history, basic models and architecture, https://doi.org/10.1007/978-3-319-45378-1_1, 2016.
[14]
G. A. Cowan, Manhattan Project to the Santa Fe Institute: The Memoirs of George A. Cowan. Albuquerque, NM, USA: University of New Mexico Press, 2010.
[15]
S. Xu, Emergent behavior in cybersecurity, in Proc. 2014 Symp. and Bootcamp on the Science of Security, Raleigh, NC, USA, 2014, pp. 1–2.
[16]
H. Sayama, Introduction to the Modeling and Analysis of Complex Systems. Albany, NY, USA: Open SUNY Textbooks, 2015.
[18]
A. Attiah, M. Chatterjee, and C. C. Zou, A game theoretic approach to model cyber attack and defense strategies, in Proc. 2018 IEEE Int. Conf. Communications (ICC), Kansas City, MO, USA, 2018, pp. 1–7.
[19]
R. Mitchell and B. Healy, A game theoretic model of computer network exploitation campaigns, in Proc. 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 2018, pp. 431–438.
[20]
C. A. Kamhoua, C. D. Kiekintveld, F. Fang, and Q. Zhu, eds., Game Theory and Machine Learning for Cyber Security. Hoboken, NJ, USA: Wiley, 2021.
[24]
A. Mcleod, C. A. Dorantes, and G. B. Dietrich, Modeling security vulnerabilities using chaos theory: Discovering order, structure and patterns from chaotic behavior in complex systems, presented at the 7th Annual Security Conference, Las Vegas, NV, USA, 2008.
[25]
C. A. Dorantes, A. J. McLeod, and G. B. Dietrich, Cyber-emergencies: What managers can learn from complex systems and chaos theory, in Proc. 12th Americas Conference on Information Systems (AMCIS 2006), Acapulco, Mexico, 2006, pp. 1563–1573.
[28]
H. Qin, D. Liu, and J. Weng, Cellular automata based cyber risk conduction mechanism of cyber physical power systems, in Proc. 2020 IEEE Sustainable Power and Energy Conference (iSPEC), Chengdu, China, 2020, pp. 1672–1677.
[29]
G. Cisotto and L. Badia, Cyber security of smart grids modeled through epidemic models in cellular automata, in Proc. 2016 IEEE 17th Int. Symp. on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), Coimbra, Portugal, 2016, pp. 1–6.
[30]
J. Zhang, X. Xiong, Y. Wang, and J. Zhang, Simulation model for cascading failure in complex network: A cellular automata approach, in Proc. 2nd World Symp. on Software Engineering, Chengdu, China, 2020, pp. 274–277.
[33]
D. Ionică, N. Popescu, D. Popescu, and F. Pop, Cyber defence capabilities in complex networks, in Internet of Everything, B. Di Martino, K. C. Li, L. T. Yang, and A. Esposito, eds. Singapore: Springer, 2018, pp. 217–231.
[35]
C. R. Shalizi, Methods and techniques of complex systems science: An overview, in Complex Systems Science in Biomedicine, T. S. Deisboeck and J. Y. Kresh, eds. Boston, MA, USA: Springer, 2006, pp. 33–114.
[36]
T. Mary-Huard and S. Robin, Introduction to statistical methods for complex systems, in Handbook of Statistical Systems Biology, M. P. H. Stumpf, D. J. Balding, and M. Girolami, eds. Chichester, UK: John Wiley & Sons, Ltd, 2011, pp. 15–38.
[41]
K. Pei, Bridging statistical learning and formal reasoning for cyber-attack detection, MS dissertation, Department of Computer Science, Purdue University, West Lafayette, IN, USA, 2016.
[47]
Ş. Bora and S. Emek, Agent-based modeling and simulation of biological systems, in Modeling and Computer Simulation, D. Cvetković, ed. London, UK: IntechOpen, 2018, pp. 29−43.
[49]
CoMSES, Computational model library, https://www.comses.net/codebases/, 2021.
[51]
J. Bates, Measuring complexity using information fluctuation: A tutorial, https://www.researchgate.net/publication/340284677_Measuring_complexity_using_information_fluctuation_a_tutorial, 2020.
[52]
S. Xu, Cybersecurity dynamics: A foundation for the science of cybersecurity, in Proactive and Dynamic Network Defense, C. Wang and Z. Lu, eds. Cham, Switzerland: Springer, 2019, pp. 1–31.
[53]
S. Xu, The cybersecurity dynamics way of thinking and landscape, in Proc. 7th ACM Workshop on Moving Target Defense, Virtual Event, USA, 2020, pp. 69–80.
[54]
S. Xu, Cybersecurity dynamics, in Proc. 2014 Symp. and Bootcamp on the Science of Security, Raleigh, NC, USA, 2014, pp. 1–2.
[55]
I. Kotenko, A. Konovalov, and A. Shorov, Simulation of botnets: Agent-based approach, in Intelligent Distributed Computing IV, M. Essaaidi, M. Malgeri, and C. Badica, eds. Berlin, Germany: Springer, 2010, pp. 247–252.
[57]
I. Kotenko, Simulation of agent teams: Application of a domain independent framework to computer network security, in Proc. 23rd European Conference on Modelling and Simulation (ECMS 2009), Mondragon, Spain, 2009, pp. 1–7.
[59]
I. Kotenko and E. Man’kov, Experiments with simulation of attacks against computer networks, in Computer Network Security, V. Gorodetsky, L. Popyack, and V. Skormin, eds. Berlin, Germany: Springer, 2003, pp. 183–194.
[60]
I. Kotenko, Teamwork of hackers-agents: Modeling and simulation of coordinated distributed attacks on computer networks, in Multi-Agent Systems and Applications III, V. Mařík, M. Pěchouček, and J. Müller, eds. Berlin, Germany: Springer, 2003, pp. 464–474.
[61]
I. Kotenko, Agent-based modeling and simulation of cyber-warfare between malefactors and security agents in Internet, in Proc. Simul. Wider Eur. - 19th Eur. Conf. Model. Simul. ECMS 2005, Riga, Latvia, 2005, pp. 533–543.
[62]
I. Kotenko, Multi-agent modelling and simulation of cyber-attacks and cyber-defense for homeland security, in Proc. 2007 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, Dortmund, Germany, 2007, pp. 614–619.
[64]
K. Sycara and M. Lewis, Agent-based approaches to dynamic team simulation, in Navy Personnel Research, Studies, and Technology Division Bureau of Naval Personnel, https://apps.dtic.mil/sti/pdfs/ADA487741.pdf, 2008.
[66]
D. Grunewald, M. Lützenberger, J. Chinnow, R. Bye, K. Bsufka, and S. Albayrak, Agent-based network security simulation, in Proc. 10th Int. Conf. Autonomous Agents and Multiagent Systems, Taipei, China, 2011, pp. 1325–1326.
[67]
Y. Zhao, Y. Wang, H. Zhang, C. Zhang, and C. Yang, Agent-based network security simulator Nessi2,https://api.semanticscholar.org/CorpusID:61933384, 2015.
[68]
A. Kosowski and V. Mosorov, Nessi2 simulator for large-scale DDoS attack analysis, in Proc. Perspective Technologies and Methods in MEMS Design, Polyana, Ukraine, 2011, pp. 157–159.
[69]
M. D. Norman and M. T. K. Koehler, Cyber defense as a complex adaptive system: A model-based approach to strategic policy design, in Proc. 2017 Int. Conf. The Computational Social Science Society of the Americas, Santa Fe, NM, USA, 2017, p. 17.
[70]
G. B. Dobson and K. M. Carley, Cyber-FIT: An agent-based modelling approach to simulating cyber warfare, in Social, Cultural, and Behavioral Modeling, D. Lee, Y. Lin, N. Osgood, and R. Thomson, eds. Cham, Switzerland: Springer International Publishing, 2017, pp. 139–148.
[71]
B. Becote, Defining a cyber operations performance framework via computational modeling, PhD dissertation, Department of Computer and Cyber Sciences, Dakota State University, Madison, SD, USA, 2023.
[72]
U. Wilensky and W. Rand, An Introduction to Agent-Based Modeling: Modeling Natural, Social, and Engineered Complex Systems with NetLogo. Cambridge, MA, USA: MIT Press, 2015.
[73]
NetLogo home page, http://ccl.northwestern.edu/netlogo, 2016.
[74]
Repast Suite documentation, https://repast.github.io/index.html, 2021.
[75]
StarLogo Nova, https://www.slnova.org/, 2022.
[76]
J. Dykstra, Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems. Sebastopol, CA, USA: O’Reilly Media, 2016.
[77]
A. Kott, Towards fundamental science of cyber security, in Network Science and Cybersecurity, R. E. Pino, ed. New York, NY, USA: Springer, 2013, pp. 1–13.
[80]
C. Chethana, P. K. Pareek, V. H. Costa de Albuquerque, A. Khanna, and D. Gupta, Deep learning technique based intrusion detection in cyber-security networks, in Proc. 2022 IEEE 2nd Mysore Sub Section Int. Conference (MysuruCon), Mysuru, India, 2022, pp. 1–7.
[81]
H. Ishii and Q. Zhu, Security and Resilience of Control Systems: Theory and Applications. Cham, Switzerland: Springer, 2022.
[83]
J. R. Rose, M. Swann, K. P. Grammatikakis, I. Koufos, G. Bendiab, S. Shiaeles, and N. Kolokotronis, IDERES: Intrusion detection and response system using machine learning and attack graphs, J. Syst. Archit., vol. 131, p. 102722, 2022.
[85]
I. H. Sarker, A. I. Khan, Y. B. Abushark, and F. Alsolami, Internet of Things (IoT) security intelligence: A comprehensive overview, machine learning solutions and research directions, Mob. Netw. Appl.. doi: 10.1007/s11036-022-01937-3.
[90]
G. Apruzzese, M. Andreolini, L. Ferretti, M. Marchetti, and M. Colajanni, Modeling realistic adversarial attacks against network intrusion detection systems, Digit. Threats Res. Pract., vol. 3, no. 3, p. 31, 2022.
[91]
E. Best, Modeling and simulation for security: An overview, in Handbook of Security Science, A. J. Masys, ed. Cham, Switzerland: Springer International Publishing, 2022, pp. 447–458.
[92]
M. Poursoltan, N. Pinède, B. Vallespir, and M. K. Traore, A new modeling framework for cyber-physical and human systems, in Proc. 2022 Annual Modeling and Simulation Conference (ANNSIM), San Diego, CA, USA, 2022, pp. 90–101.
[94]
J. M. Couretas, An Introduction to Cyber Modeling and Simulation. Hoboken, NJ, USA: Wiley, 2018.
[95]
J. Pawlick and Q. Zhu, Game Theory for Cyber Deception: From Theory to Applications. Cham, Switzerland: Springer International Publishing, 2021.