1. S. Abt and H. Baier, Are we missing labels? A study of the availability of ground truth in network security research, Proceedings of the Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, pp. 40–55, 2014.
2. I. Baggili and F. Breitinger, Data sources for advancing cyber forensics: What the social world has to offer, Proceedings of the AAAI Spring Symposia – Sociotechnical Behavior Mining: From Data to Decisions? pp. 6–9, 2015.
3. Biometrics and Information Security Group (dasec), hystck-malware-module, GitHub (github.com/dasec/hystck-malware-module), 2022.
4. D. Brauckhoff, A. Wagner and M. May, FLAME: A flow-level anomaly modeling engine, Proceedings of the Conference on Cyber Security Experimentation and Test, article no. 1, 2008.
5. B. Carrier, Open Source Digital Forensic Tools: The Legal Argument, @stake, Cambridge, Massachusetts, 2002.