1. Characterization of encrypted and VPN traffic using time-related features;Habibi Lashkari,2016
2. Doers, not watchers: Intelligent autonomous agents are a path to cyber resilience;Kott;IEEE Secur Priv,2020
3. Locked shields: Nato cyber defense exercise 2012;Schuetz,2012
4. Estonia: what doesn’t kill you makes you stronger;Mansfield-Devine;Netw Secur,2012
5. Mitre att & ck: Design and philosophy;Strom,2018