1. 2017. Center for Internet Security (CIS). https://www.cisecurity.org/ms-isac. [Accessed: 2023-02-29].
2. 2022. Regualr expression Python package. https://pypi.org/project/regex/. [Accessed: 2023-01-15].
3. A two-stage stochastic program for multi-shift, multi-analyst, workforce optimization with multiple on-call options;Altner S;Journal of Scheduling,2018
4. Muhamad Erza Aminanto, Lei Zhu, Tao Ban, Ryoichi Isawa, Takeshi Takahashi, and Daisuke Inoue. 2019. Automated Threat-Alert Screening for Battling Alert Fatigue with Temporal Isolation Forest. In 2019 17th International Conference on Privacy, Security and Trust (PST). 1–3. https://doi.org/10.1109/PST47121.2019.8949029
5. Giovanni Apruzzese, Michele Colajanni, Luca Ferretti, Alessandro Guido, and Mirco Marchetti. 2018. On the effectiveness of machine and deep learning for cyber security. In 2018 10th International Conference on Cyber Conflict (CyCon). 371–390. https://doi.org/10.23919/CYCON.2018.8405026