1. Caltagirone, S., Pendergast, A., & Betz, C. (2013). Diamond Model of Intrusion Analysis. Center for Cyber Threat Intelligence and Threat Research, Technical Report ADA586960.
2. Koujalagi, A. (2015). Intelligence-Driven Computer Network Defence Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains. Academic Press.
3. A Survey of Network Space Threat Intelligence Perception, Sharing and Analysis Technology;J.Li;Journal of Network and Information Security,2016
4. Ma, Ting, & Yue. (2016). The US Network Security Information Sharing Mechanism and Its Enlightenment to China. Journal of Information, 35(3), 17-23.