1. Rawan Al-Shaer , Jonathan M Spring , and Eliana Christou . 2020 . Learning the Associations of MITRE ATT & CK Adversarial Techniques. In 2020 IEEE Conference on Communications and Network Security (CNS). IEEE, 1–9. https://doi.org/10 .1109/CNS48642.2020.9162207 10.1109/CNS48642.2020.9162207 Rawan Al-Shaer, Jonathan M Spring, and Eliana Christou. 2020. Learning the Associations of MITRE ATT & CK Adversarial Techniques. In 2020 IEEE Conference on Communications and Network Security (CNS). IEEE, 1–9. https://doi.org/10.1109/CNS48642.2020.9162207
2. A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities
3. Security Tradeoffs in Cyber Physical Systems: A Case Study Survey on Implantable Medical Devices
4. Attacksim. 2021 . Rootkit r-77: An example of A-DEMO . Retrieved September 30, 2021 from https://github.com/attacksim/A-demo/wiki/UC3-rootkit Attacksim. 2021. Rootkit r-77: An example of A-DEMO. Retrieved September 30, 2021 from https://github.com/attacksim/A-demo/wiki/UC3-rootkit
5. Bytecode. 2021 . r77rootkit - Fileless ring 3 rootkit . Retrieved September 10, 2021 from https://github.com/bytecode77/r77-rootkit Bytecode. 2021. r77rootkit - Fileless ring 3 rootkit. Retrieved September 10, 2021 from https://github.com/bytecode77/r77-rootkit