1. Diday, E., Simon, J.C.: Clustering analysis. In: Fu, K.S. (ed.) Digital Pattern Recognition, pp. 47–94. Springer, Heideberg (1980).
https://doi.org/10.1007/978-3-642-67740-3_3
2. Genes, R., Arrott, A., Sancho, D.: Stormy weather: a quantitative assessment of the storm web threat in 2007 (2011)
3. Han, W., Lei, C.: A survey on policy languages in network and security management. Comput. Netw. 56(1), 477–489 (2012)
4. Johnson, C., Badger, L., Waltermire, D., Snyder, J., Skorupka, C.: Guide to cyber threat information sharing. NIST Spec. Publ. 800, 150 (2016)
5. Johnson, C.S., Feldman, L., Witte, G.A.: Cyber threat intelligence and information sharing. Technical report (2017)