1. Hutchins EM, Cloppert MJ, Amin RM. Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains; 2010. Available from: https://api.semanticscholar.org/CorpusID:6421896.
2. A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities;A Alshamrani;IEEE Communications Surveys & Tutorials,2019
3. Ghafir I, Přenosil V. Advanced Persistent Threat Attack Detection: An Overview; 2014. Available from: https://api.semanticscholar.org/CorpusID:111334688.
4. Stuxnet, the real start of cyber warfare? [Editor’s Note];TM Chen;IEEE Network,2010
5. TagSeq: Malicious behavior discovery using dynamic analysis;YT Huang;PLOS ONE,2022