1. IEEESpectrum, The real story of stuxnet, https://spectrum.ieee.org/the-real-story-of-stuxnet, 2 (2013)
2. Ajp-3.20 allied joint doctrine for cyberspace operations, January 2020, edition A Version 1. [Online]. Available: https://assets.publishing.service.gov.uk/media/5f086ec4d3bf7f2bef137675/doctrine_nato_cyberspace_operations_ajp_3_20_1_.pdf
3. Ahlberg, C.: Moving toward a security intelligence program, The Threat Intelligence Handbook, 2nd ed., CyberEdge Group LLC: Annapolis, MD, USA, (2019)
4. T. Rep. (2020). Cost of a data breach report. [Online]. Available: https://www.ibm.com/security/digital-assets/cost-data-breach-report/1Cost%20of%20a%20Data%20Breach%20Report%202020.pdf
5. Alshamrani, A., Myneni, S., Chowdhary, A., Huang, D.: A survey on advanced persistent threats: techniques, solutions, challenges, and research opportunities. IEEE Commun. Surv. & Tutor. 21(2), 1851–1877 (2019)