1. Malware Risks And Mitigation Report. 1st ed. BITS - The financial services roundtable (2011).
http://www.nist.gov/itl/upload/BITS-Malware-Report-Jun2011.pdf
2. Ranum, M.J.: Breaking Cyber Kill Chains. Tenable Network Security (2014).
http://www.tenable.com/blog/breaking-cyber-kill-chains
3. Sager, T.: Killing Advanced Threats in Their Tracks: An Intelligent Approach to Attack Prevention. Sansorg (2014).
http://www.sans.org/reading-room/whitepapers/detection/killing-advanced-threats-tracks-intelligent-approach-attack-prevention-35302
4. The Cyber Attack Cycle.
http://www.eur.army.mil/vigilance/Cyber_Attack_Cycle.pdf
5. Hartley, M.: Strengthening Cyber Kill Chain with Cyber Threat Intelligence. iSIGHT Partners (2014).
http://www.isightpartners.com/2014/09/strenghtening-cyber-kill-chain-cyber-threat-intelligence-part-1-of-2/