1. Abu MS et al (2018) Cyber threat intelligence–issue and challenges. Indones J Electr Eng Comput Sci 10(1):371–379
2. Baldoni R (2014) Critical infrastructure protection: threats, attacks, and counter-measures. Technical Report. Available online: http://www.dis.uniroma1.it/~tenace
3. Barnum S (2008) ‘Common attack pattern enumeration and classification (capec) schema description’, Cigital Inc, http://capec.mitre.org/documents/documentation/CAPEC_Schema_Description_v1.3.
4. Bialas A (2016) Risk management in critical infrastructure—foundation for its sustainable work. Sustainability. https://doi.org/10.3390/su8030240
5. Boudreau M-C, Gefen D, Straub DW (2001) ‘Validation in information systems research: A state-of-the-art assessment’, MIS quarterly, pp 1–16