1. [1] R. Ross et al., SP 800-39. Managing information security risk: Organization, mission, and information system view. National Institute of Standards & Technology, 2011.
2. [2] P. Chen, L. Desmet, and C. Huygens, “A study on advanced persistent threats,” in Communications and Multimedia Security: 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014. Proceedings 15. Springer, 2014, pp. 63–72.
3. [3] J. Carr, Inside cyber warfare: Mapping the cyber underworld. O’Reilly Media, Inc., 2012.
4. [4] K. Giles, “Information Troops. a russian cyber command?” in 2011 3rd International Conference on Cyber Conflict. IEEE, 2011, pp. 1–16.
5. [5] M. Connell and S. Vogler, “Russia’s approach to cyber warfare,” [Online]. Available: https://www.cna.org/archive/ CNA Files/pdf/dop-2016-u-014231-1rev.pdf, Center for Naval Analyses, Tech. Rep., September 2016.