1. Federal Privacy Council (FPC), Cybersecurity Information Sharing Act of 2015 (CISA), https://www.fpc.gov/19081/ (2015).
2. U. S. Congress, S. 754 cybersecurity information sharing act of 2015 (2015).
3. D.A. Wheeler, G.N. Larsen, Techniques for cyber attack attribution, Tech. rep., Institute For Defense Analyses Alexandria VA (2003).
4. Role and challenges for sufficient cyber-attack attribution;Hunker;Inst. Inf. Infrastruct. Prot.,2008
5. First half 2018 breach level index report, https://www.gemalto.com/press/pages/data-breaches-compromised-4-5-billion-records-in-first-half-of-2018.aspx, accessed: 2018-12-28.