1. R. Andrade and J. Torres . 2018. Enhancing intelligence SOC with big data tools. In 2018 IEEE 9th Annual Information Technology , Electronics and Mobile Communication Conference (IEMCON). 1076–1080 . https://doi.org/10.1109/IEMCON. 2018 .8614779 10.1109/IEMCON.2018.8614779 R. Andrade and J. Torres. 2018. Enhancing intelligence SOC with big data tools. In 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON). 1076–1080. https://doi.org/10.1109/IEMCON.2018.8614779
2. Steven Bird , Ewan Klein , and Edward Loper . 2009. Natural Language Processing with Python ( 1 st ed.). O’Reilly Media, Inc. Steven Bird, Ewan Klein, and Edward Loper. 2009. Natural Language Processing with Python(1st ed.). O’Reilly Media, Inc.
3. Cisco Systems Inc.2022. cybersecurity - Cisco Blogs. Retrieved June 26 2022 from https://blogs.cisco.com/tag/cybersecurity Cisco Systems Inc.2022. cybersecurity - Cisco Blogs. Retrieved June 26 2022 from https://blogs.cisco.com/tag/cybersecurity
4. The MITRE Corporation . 2022 . CAPEC - CAPEC-1000: Mechanisms of Attack . Retrieved June 26, 2022 from https://capec.mitre.org/data/definitions/1000.html The MITRE Corporation. 2022. CAPEC - CAPEC-1000: Mechanisms of Attack. Retrieved June 26, 2022 from https://capec.mitre.org/data/definitions/1000.html
5. The MITRE Corporation . 2022 . CAPEC - CAPEC-3000: Domains of Attack . Retrieved June 26, 2022 from https://capec.mitre.org/data/definitions/3000.html The MITRE Corporation. 2022. CAPEC - CAPEC-3000: Domains of Attack. Retrieved June 26, 2022 from https://capec.mitre.org/data/definitions/3000.html