References
- Applebaum, A., Miller, D., Strom, B., Korban, C., & Wolf, R. (2016). Intelligent, automated red team emulation. In Proceedings of the 32nd Annual Conference on Computer Security Applications. https://doi.org/10.1145/2991079.2991111
- Carey, M. J., & Jin, J. (2019). Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity. John Wiley & Sons.
- Everson, D. A. C. L. (2020). Network attack surface simplification for red and blue teams.
- Han, X., Kheir, N., & Balzarotti, D. (2018). Deception techniques in computer security: A research perspective. ACM Computing Surveys, 51(4), Article 80. https://doi.org/10.1145/3214305
- Kovačević, I., & Groš, S. (2020). Pentesters, APTs, or neither. In 43rd International Convention on Information, Communication and Electronic Technology (MIPRO).
- Veerasamy, N. (2009). ”High-Level Methodology for Carrying out Combined Red and Blue Teams.“ 2009 Second International Conference on Computer and Electrical Engineering, Dubai, United Arab Emirates, pp. 416–420. https://doi.org/10.1109/ICCEE.2009.177