Publisher
Springer Nature Singapore
Reference33 articles.
1. Brynielsson, J., Franke, U., Tariq, M.A., Varga, S.: Using cyber defense exercises to obtain additional data for attacker profiling. In: IEEE Conference on Intelligence and Security Informatics (ISI) (2016)
2. Samtani, S., Chinn, R., Chen, H., Nunamaker, J.F.: Exploring emerging hacker assets and key hackers for proactive cyber threat intelligence. J. Manage. Inf. Syst. 34(4) (2017)
3. Agrafiotis, I., Nurse, J.R., Buckley, O., Legg, P., Creese, S., Goldsmith, M.: Identifying attack patterns for insider threat detection. Comput. Fraud Secur. 7 (2015)
4. Miles, C., Lakhotia, A., LeDoux, C., Newsom, A., Notani, V.: Virusbattle: state-of-the-art malware analysis for better cyber threat intelligence. In: 7th International Symposium on Resilient Control Systems (ISRCS) (2014)
5. Franklin, D., Ransomware, P.: Available https://exchange.xforce.ibmcloud.com/collection/PetyaRansomware024ee880d86e353ef307155cfe936c5a. Accessed 28 Jan 2018