1. Falcone, R.: OilRig uses RGDoor IIS Backdoor on Targets in the Middle East (2018). https://unit42.paloaltonetworks.com/unit42-oilrig-uses-rgdoor-iis-backdoor-targets-middle-east/. Accessed 7 December 2020
2. Baker, P.: The SolarWinds hack timeline: Who knew what, and when? (2021). https://www.csoonline.com/article/3613571/the-solarwinds-hack-timeline-who-knew-what-and-when.html
3. Cichonski, P., Millar, T., Grance, T., Scarfone, K.: Computer Security Incident Handling Guide. CSRC (2012). https://csrc.nist.gov/publications/detail/sp/800-61/rev-2/final
4. Incident Response SANS: The 6 Steps in Depth. Cynet. (n.d.). https://www.cynet.com/incident-response/incident-response-sans-the-6-steps-in-depth/
5. Liu, K., Tang, S., Wan, J., Ding, S., Qin, X.: Improved layed architecture for developing semantic web application. In: 2010 2nd International Conference on Future Computer and Communication, vol. 3, pp. V3–769. IEEE (2010