[1] JAJODIA S, LIU P, SWARUP V, et al.Cyber situational awareness: issues and research[M].Boston, MA: Springer-Verlag, 2010.
[7] HUSAK M, KOMARKOVA J, BOU-HARB E, et al.Survey of attack projection, prediction, and forecasting in cyber security[J].IEEE Communications Surveys and Tutorials, 2019, 21(1): 640-660.
[8] YI B, CAO Y P, SONG Y.Network security risk assessment model based on fuzzy theory[J].Journal of Intelligent & Fuzzy Systems, 2020, 38(4): 3921-3928.
[9] LI Y F, REN C, ZHAO H W, et al.Investigating long-term vehicle speed prediction based on GA-BP algorithms and the road-traffic environment[J].Science China(Information Sciences), 2020, 63(9): 121-123.
[11] WANG X Y, WANG C H, LI Q.Short-term wind power prediction using GA-ELM[J].The Open Electrical & Electronic Engineering Journal, 2017, 11: 48-56.
[13] HUANG G B, ZHU Q Y, SIEW C K.Extreme learning machine: theory and applications[J].Neurocomputing, 2006, 70: 489-501.
[15] ELONS A S, MAGDI D A, ELGENDY M Y.A proposed model for predicting the drilling path based on hybrid PSO-BP neural network[C]//SAI Computing Conference.London: IEEE, 2016: 148-155.
[17] RATNAWEERA A, HALGAMUGE S K, WATSON H C.Self-organizing hierarchical particle swarm optimizer with time-varying acceleration coefficients[J].IEEE Transactions on Evolutionary Computation, 2004, 8(3): 240-255.