References
- Jouini, M., Rabai, L.B.A., Aissa, A.B.: Classification of security threats in information systems. Procedia Computer Science 32 (2014) 489-496
- Simmons C., Ellis, C., Shiva, S., Dasgupta, D., Wu, Q.: AVOIDIT: A Cyber Attack Taxonomy. University of Memphis, Technical Report CS-09-003 (2009)
- Bishop, M.: A Taxonomy of UNIX System and Network Vulnerabilities. Technical Report CSE-95-10, Department of Computer Science, University of California at Davis. (1995)
- Howard, J.: Analysis of security incidents on the Internet. Unpublished doctoral dissertation, Carnegie Mellon University (1997)
- Lough D.L.: A Taxonomy of Computer Attacks with Applications to Wireless Networks. Doctoral Dissertation, Virginia Tech (2001)
- Howard, J.D., Longstaff, T.A.: A Common Language for Computer Security Incidents. Sandia National Laboratories, Albuquerque, New Mexico and Livermore, California, Technical Report SAND98-8667 (1998)
- Hansman, S., Hunt, R.:A Taxonomy of Network and Computer Attacks. Computers & Security, 24 (1). (2005) 31-43
- Kjaerland, M.: A taxonomy and comparison of computer security incidents from the commercial and government sectors. Computers and Security. 25 (7). (2006) 522-538
- Bazaz, A., Arthur, J.D.: Towards a Taxonomy of Vulnerabilities. HICSS Proceedings of the 40th Annual Hawaii International Conference on System Sciences. (2007). 163a
- Joshi, C. and Singh, U.K.: ADMITA Five Dimensional Approach towards Standardization of Network and Computer Attack Taxonomies. International Journal of Computer Applications. 100(5). (2014)30-36
- Wu, M. and Moon, Y.B., 2017. Taxonomy of cross-domain attacks on cybermanufacturing system. Procedia Computer Science, 114, pp.367-374.
- Martin, L., 2014. Cyber Kill Chain®. URL: http://cyber.lockheedmartin.com/hubfs/Gaining_the_Advantage_Cyber_Kill_Chain.pdf.
- Mason J.: Cyber Security Statistics. https://thebestvpn.com/cyber-security-statistics-2018/. Accessed November 2018.
- McCullen R.: Cyberthreats: A 10-Year Perspective. https://www.forbes.com/sites/forbestechcouncil/2018/05/15/cyberthreats-a-10-year-perspective/#4cab00005e9e. Accessed November 2018.
- m-trends 2018. https://www.fireeye.com/content/dam/collateral/en/mtrends-2018.pdf Accessed November 2018.
- 2018 Security Report. https://www.checkpoint.com/downloads/product-related/report/2018-security-report.pdf. Accessed November 2018.
- 2018 Security Report Symantec Threat Database. https://www.symantec.com/security-center/a-z. Accessed September 2018.
- 2018 Internet Security Threat Report. https://www.symantec.com/content/dam/symantec/docs/reports/istr-23-executive-summary-en.pdf. Accessed September 2018.