1. Geoff Ackerman, Rick Cole, Andrew Thompson, Alex Orleans, and Nick Carr. 2018. Overruled: Containing a potentially destructive adversary. https://www.mandiant.com/resources/blog/overruled-containing-a-potentially-destructive-adversary
2. James F Allen. 1983. Maintaining knowledge about temporal intervals. Dep. of Computer Science, Univ. of Rochester.
3. Adi Aviad, Krzysztof Węcel, and Witold Abramowicz. 2015. The Semantic Approach to Cyber Security. Towards Ontology Based Body of Knowledge. European Conference on Information Warfare and Security, ECCWS 2015, 328–336.
4. Modeling Cyber Threat Intelligence
5. A semantic web enabled host intrusion detection system