1. Sean Barnum . 2014. Standardizing cyber threat intelligence information with the Structured Threat Information eXpression (STIX™) . MITRE Corporation , July ( 2014 ). Sean Barnum. 2014. Standardizing cyber threat intelligence information with the Structured Threat Information eXpression (STIX™). MITRE Corporation, July (2014).
2. Rank Correlation Methods.
3. Sergio Caltagirone , Andrew Pendergast , and Christopher Betz . 2013. The Diamond Model of Intrusion Analysis. Threat Connect 298 ( 2013 ). Issue 0704. Sergio Caltagirone, Andrew Pendergast, and Christopher Betz. 2013. The Diamond Model of Intrusion Analysis. Threat Connect 298 (2013). Issue 0704.
4. Bill Cheswick . 1992 . An Evening with Berferd in Which a Cracker is Lured, Endured, and Studied . In Proceedings of the Winter USENIX Conference (1992). Bill Cheswick. 1992. An Evening with Berferd in Which a Cracker is Lured, Endured, and Studied. In Proceedings of the Winter USENIX Conference (1992).
5. European Commission . 2016. REGULATION (EU) 2016/679 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC. Official Journal of the European Union ( 2016 ), 88. https://eur-lex.europa.eu/eli/reg/2016/679/oj European Commission. 2016. REGULATION (EU) 2016/679 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC. Official Journal of the European Union (2016), 88. https://eur-lex.europa.eu/eli/reg/2016/679/oj