1. M. Fey, B. Kenyon, K. Reardon, B. Rogers and C. Ross, Security Battleground: An Executive Manual, IntelPRESS. 2013, p. 240.
2. C. Zimmerman, Ten Strategies of a World-Class. Cybersecurity Operations Center. MITRE Corporate Communications and Public Affairs, 2014, p. 334.
3. M. Manshaei, Q. Zhu and T. Alpcan, "Game theory meets network security and privacy", ACM Computing Surveys, vol. 48, pp. 51-61, 2015.
4. N. Ben–Asher, C. Gonzalez, "Effects of cyber security knowledge on attack detection", Computers in Human Behavior, vol. 48, pp. 51–61, 2015.
5. K. Goztepe, "Designing Fuzzy Rule Based Expert System for Cyber Security", International Journal of Information Security Science, vol. 1, no. 1, pp. 13-19, 2012.