1. Blasco, J. (2009), “Malware: Exploring mutex objects”, Alienvault, available at: www.alienvault.com/blogs/labs-research/malware-exploring-mutex-objects (accessed 11 May 2018).
2. Danyliw, L. Meijer, J. and Demchenko, Y. (2007), “RFC 5070. The incident object description exchange format”, available at: https://tools.ietf.org/html/rfc5070
3. Exploring the opportunities and limitations of current threat intelligence platforms;ENISA,2017