1. Liu, S., Wang, X., Liu, M., Zhu, J.: Towards better analysis of machine learning models: a visual analytics perspective. Vis. Inf. 1(1), 48–56 (2017)
2. CBEST Intelligence-led testing: Understanding cyber threat intelligence operations. Bank of England (2016). https://www.bankofengland.co.uk/-/media/boe/files/financial-stability/financial-sector-continuity/understanding-cyber-threat-intelligence-operations.pdf. Accessed 1 Nov 2019
3. Payne, J.: Build a fast, free, and effective threat hunting/incident response console with windows event forwarding and PowerBI (2017).
https://blogs.technet.microsoft.com/jepayne/2017/12/08/weffles/
4. Tang, M., Fidge, C.: Reconstruction of falsified computer logs for digital forensics investigations. In: Proceedings of the Eighth Australasian Conference on Information Security, vol. 105, pp. 12–21. Australian Computer Society, Inc. (2010)
5. Advances in Information Security;M Albanese,2014