1. Red october: Diplomatic cyber attacks investigation. 2013. https://securelist.com/analysis/publications/36740/red-october-diplomatic-cyber-attacks-investigation/. Red october: Diplomatic cyber attacks investigation. 2013. https://securelist.com/analysis/publications/36740/red-october-diplomatic-cyber-attacks-investigation/.
2. Sean barnum: Standardizing cyber threat intelligence information with the structured threat information expression. http://stixproject.github.io/getting-started/whitepaper/ 2014. Sean barnum: Standardizing cyber threat intelligence information with the structured threat information expression. http://stixproject.github.io/getting-started/whitepaper/ 2014.
3. A Comparison of Tools for Detecting Fake Websites
4. Basic concepts and taxonomy of dependable and secure computing. Dependable and Secure Computing;Avizienis A.;IEEE Transactions on,2004
5. Securing cyberspace: Identifying key actors in hacker communities