1. Intrusion campaigns, https://stixproject.github.io/data-model/1.2/campaign/CampaignType/ (2022).
2. Challenges in cyber security, https://www.rasmussen.edu/degrees/technology/blog/cyber-security-problems/ (2022).
3. R. A. Bridges, T. R. Glass-Vanderlan, M. D. Iannacone, M. S. Vincent, Q. G. Chen, A survey of intrusion detection systems leveraging host data, ACM Comput. Surv. 52 (6). https://doi.org/10.1145/3344382
4. What is threat intelligence? https://www.recordedfuture.com/threat-intelligence/ (2022).
5. Why threat intelligence, https://www.threatintelligence.com/blog/threat-intelligence (2022).