1. ISO/IEC 27005:2008, Information technology—security techniques and Information security risk management (2008)
2. ISO 31000:2018, Risk management—guidelines (2018)
3. Bianco, D.: “The Pyramid of Pain”.
http://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html
(2014). Accessed 15 July 2018
4. OASIS: “STIX™ 2.0 specifications”.
https://oasisopen.github.io/cti-documentation/resources#stix-20-specification
. Accessed 7 Aug 2018
5. OASIS: “STIX™ White paper”.
https://stixproject.github.io/about/STIX_Whitepaper_v1.1.pdf
. Accessed 15 June 2018