1. Tooska Dargahi Ali Dehghantanha , Mauro Conti. 2018. Cyber Threat Intelligence . Springer Cham , Switzerland . Tooska Dargahi Ali Dehghantanha, Mauro Conti. 2018. Cyber Threat Intelligence. Springer Cham, Switzerland.
2. A. Azzini , C. Braghin , E. Damiani , and F. Zavatarelli . 2013. Using Semantic Lifting for improving Process Mining: a Data Loss Prevention System case study . In Proc. of the 3rd Intl. Symp. on Data-driven Process Discovery and Analysis(CEUR Workshop Proceedings, Vol. 1027) . CEUR-WS.org, Riva del Garda, Italy, 62–73. A. Azzini, C. Braghin, E. Damiani, and F. Zavatarelli. 2013. Using Semantic Lifting for improving Process Mining: a Data Loss Prevention System case study. In Proc. of the 3rd Intl. Symp. on Data-driven Process Discovery and Analysis(CEUR Workshop Proceedings, Vol. 1027). CEUR-WS.org, Riva del Garda, Italy, 62–73.
3. PWNJUTSU: A Dataset and a Semantics-Driven Approach to Retrace Attack Campaigns
4. Computer Security Resource Center . 2015 . Cyber Attack: Definition. NIST. https://csrc.nist.gov/glossary/term/cyber_attack Computer Security Resource Center. 2015. Cyber Attack: Definition. NIST. https://csrc.nist.gov/glossary/term/cyber_attack
5. Roman Daszczyszak Dan Ellis Steve Luke and Sean Whitley. 2019. TTP-Based Hunting. Technical Report. Internet Engineering Task Force. Roman Daszczyszak Dan Ellis Steve Luke and Sean Whitley. 2019. TTP-Based Hunting. Technical Report. Internet Engineering Task Force.