1. Cyber Threat Intelligence – Issue and Challenges
2. D. Bianco. 2013. The Pyramid of Pain. Enterprise Detection & Response (2013). http://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html
3. The diamond model of intrusion analysis;Caltagirone Sergio;Threat Connect,2013
4. CYBOX. 2020. CYBOX Sample. Online. http://cyboxproject.github.io/sample
5. Advanced Persistent Threat;Daly K.;Usenix,2009