1. David Bianco . 2013 . The Pyramid of Pain . Retrieved Jan 29, 2022 from http://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html David Bianco. 2013. The Pyramid of Pain. Retrieved Jan 29, 2022 from http://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html
2. Cyber Scanning: A Comprehensive Survey
3. Rebekah Brown and Robert M. Lee . 2019. The Evolution of Cyber Threat Intelligence (CTI): 2019 SANS CTI Survey . SANS Institute . Retrieved Jan 29, 2022 from https://www.sans.org/white-papers/38790/ Rebekah Brown and Robert M. Lee. 2019. The Evolution of Cyber Threat Intelligence (CTI): 2019 SANS CTI Survey. SANS Institute. Retrieved Jan 29, 2022 from https://www.sans.org/white-papers/38790/
4. Brant A. Cheikes , David Waltermire , and Karen Scarfone . 2011. Common platform enumeration: Naming specification version 2.3 . National Institute of Standards and Technology . Retrieved Jan 29, 2022 from https://nvlpubs.nist.gov/nistpubs/Legacy/IR/nistir7695.pdf Brant A. Cheikes, David Waltermire, and Karen Scarfone. 2011. Common platform enumeration: Naming specification version 2.3. National Institute of Standards and Technology. Retrieved Jan 29, 2022 from https://nvlpubs.nist.gov/nistpubs/Legacy/IR/nistir7695.pdf
5. The MITRE Corporation . 1999 -2022. CVE - Common Vulnerabilities and Exposures (CVE) . Retrieved Jan 29, 2022 from https://cve.mitre.org/ The MITRE Corporation. 1999-2022. CVE - Common Vulnerabilities and Exposures (CVE). Retrieved Jan 29, 2022 from https://cve.mitre.org/