1. Basyurt, A.S., Fromm, J., Kuehn, P., Kaufhold, M.-A., and Mirbabaie, M. (2022, January 21–23). Help Wanted—Challenges in Data Collection, Analysis and Communication of Cyber Threats in Security Operation Centers. Proceedings of the 17th International Conference on Wirtschaftsinformatik, WI, Nuremberg, Germany. Available online: https://www.scopus.com/inward/record.uri?eid=2-s2.0-85171997510&partnerID=40&md5=30a02b455898c7c2c9d2421d82606470.
2. Testing SOAR Tools in Use;Bridges;Comput. Secur.,2023
3. Dietrich, C., Krombholz, K., Borgolte, K., and Fiebig, T. (2018, January 15–19). Investigating System Operators’ Perspective on Security Misconfigurations. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, Toronto, ON, Canada.
4. Hughes, K., McLaughlin, K., and Sezer, S. (2020, January 11–12). Dynamic Countermeasure Knowledge for Intrusion Response Systems. Proceedings of the 2020 31st Irish Signals and Systems Conference, ISSC, Letterkenny, Ireland.
5. (2023). Vectra AI 2023 State of Threat Detection—The Defenders’ Dilemma, Vectra AI. Available online: https://www.vectra.ai/resources/2023-state-of-threat-detection.