1. Barnum, S., Standardizing Cyber Threat Intelligence Information with the Structured Threat Information eXpression (STIX™), http://stix.mitre.org/about/documents/STIX_Whitepaper_v1.0.pdf, page 11. Accessed: July 16, 2014.
2. Cain, P., APWG Adventures In Information Sharing: Now and For the Future, http://scap.nist.gov/events/2011/itsac/presentations/day2/Cain%20-%20Advenures%20in%20Info%20Sharing.pdf. Accessed: July 16, 2014.
3. Claise, B., Trammell, B., Aitken, P., Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information, IETF RFC 7011, September 2013.
4. Danyliw, R., Meijer, J., Demchenko, Y., The Incident Object Description Exchange Format, IETF RFC5070, December 2007.
5. DHS, DHS Sensitive Systems Policy Directive 4300A, Ver-sion 8.0, DHS, March 14, 2011.