1. On the collaborative practices of cyber threat intelligence analysts to develop and utilize tacit threat and defence knowledge;Ahrend,2016
2. Standardizing cyber threat intelligence information with the structured threat information expression (stix);Barnum;Mitre Corporation,2012
3. Automatic extraction of indicators of compromise for web applications;Catakoglu,2016
4. Automatic extraction of indicators of compromise for web applications;Catakoglu;The web conference,2016
5. Automated behavioral analysis of malware a case study of wannacry ransomware;Chen,2017