1. Athanasiades, N., et al., Intrusion detection testing and benchmarking methodologies, in First IEEE International Workshop on Information Assurance. 2003, IEEE: Darmstadt, Germany.
2. Kaloroumakis, P.E. and M.J. Smith, Toward a Knowledge Graph of Cybersecurity Countermeasures, M. Corporation, Editor. 2021.
3. Alexander, O., M. Belisle, and J. Steele, MITRE ATT&CK® for industrial control systems: Design and philosophy. The MITRE Corporation: Bedford, MA, USA, 2020.
4. Hutchins, E.M., M.J. Cloppert, and R.M. Amin. Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. in Proceedings of the 6th International Conference on Information Warfare and Security. 2011.
5. Mireles, J.D., J.-H. Cho, and S. Xu. Extracting attack narratives from traffic datasets. in 2016 International Conference on Cyber Conflict (CyCon US). 2016. IEEE.