R. P. Van-heerden, H. Pieterse, and B. Irwin, Mapping the Most Significant Computer Hacking Events to a Temporal Computer Attack Model, International Conference on Human Choice and Computers (HCC10): ICT Critical Infrastructures and Society, IFIP, pp.226-236, 2012.
DOI : 10.1007/978-3-642-33332-3_21

R. P. Van-heerden, I. Burke, and B. Irwin, Classifying network attack scenarios using an ontology, Proceedings of the 7th International Conference on Information-Warfare & Security, pp.311-324, 2012.

P. Joyal, Industrial espionage today and information wars of tomorrow, 19th National Information Systems Security Conference, pp.139-151, 1996.

A. Burstein, Trade secrecy as an instrument of national security?rethinking the foundations of economic espionage, Arizona State Law Journal, vol.41, pp.933-1167, 2009.

T. Grant, H. Venter, and J. Eloff, Simulating adversarial interactions between intruders and system administrators using OODA-RR, Proceedings of the 2007 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries , SAICSIT '07, pp.46-55, 2007.
DOI : 10.1145/1292491.1292497

R. Van-heerden, L. Leenen, B. Irwin, and I. Burke, A Computer Network Attack Taxonomy and Ontology, International Journal of Cyber Warfare and Terrorism, vol.2, issue.3, pp.12-25, 2012.
DOI : 10.4018/ijcwt.2012070102

S. Fenz and T. Neubauer, How to determine threat probabilities using ontologies and Bayesian networks, Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research Cyber Security and Information Intelligence Challenges and Strategies, CSIIRW '09, p.69, 2009.
DOI : 10.1145/1558607.1558686

Y. Shavitt and N. Zilberman, A Geolocation Databases Study, IEEE Journal on Selected Areas in Communications, vol.29, issue.10, pp.2044-2056, 2011.
DOI : 10.1109/JSAC.2011.111214

H. Ezzeldin, Nmap detection and countermeasures, Online, 2008.

W. E. Kibret, Analyzing network security from a defense in depth perspective, 2011.

K. H. Yung, Detecting Long Connection Chains of Interactive Terminal Sessions, Recent Advances in Intrusion Detection, pp.1-16, 2002.
DOI : 10.1007/3-540-36084-0_1

L. Spitzner, Honeypots: catching the insider threat, 19th Annual Computer Security Applications Conference, 2003. Proceedings., pp.170-179, 2003.
DOI : 10.1109/CSAC.2003.1254322

J. Myers, M. Grimaila, and R. Mills, Towards insider threat detection using web server logs, Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research Cyber Security and Information Intelligence Challenges and Strategies, CSIIRW '09, pp.54-58, 2009.
DOI : 10.1145/1558607.1558670

I. Poese, S. Uhlig, M. A. Kaafar, B. Donnet, and B. Gueye, IP geolocation databases, ACM SIGCOMM Computer Communication Review, vol.41, issue.2, pp.53-56, 2011.
DOI : 10.1145/1971162.1971171

URL : https://hal.archives-ouvertes.fr/hal-00748223

E. Katz-bassett, J. P. John, A. Krishnamurthy, D. Wetherall, T. Anderson et al., Towards IP geolocation using delay and topology measurements, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, pp.71-84, 2006.
DOI : 10.1145/1177080.1177090

D. Sanger, Obama order sped up wave of cyberattacks against iran, Online, 2012.

G. Shiffman and R. Gupta, Crowdsourcing cyber security: a property rights view of exclusion and theft on the information commons, International Journal of the Commons, vol.7, issue.1, pp.93-112, 2013.
DOI : 10.18352/ijc.343

G. Stout, Testing a website: Best practices, Reveregroup, 2001.

T. F. Lunt, A survey of intrusion detection techniques, Computers & Security, vol.12, issue.4, pp.405-418, 1993.
DOI : 10.1016/0167-4048(93)90029-5

G. Tjhai, M. Papadaki, S. Furnell, and N. Clarke, Investigating the problem of IDS false alarms: An experimental study using Snort, Proceedings of the IFIP TC 11 23rd International Information Security Conference, pp.253-267, 2008.
DOI : 10.1007/978-0-387-09699-5_17

S. Hariri, G. Qu, T. Dharmagadda, M. Ramkishore, and C. S. Raghavendra, Impact analysis of faults and attacks in large-scale networks, IEEE Security & Privacy Magazine, vol.1, issue.5, pp.49-54, 2003.
DOI : 10.1109/MSECP.2003.1236235

I. Kuwatly, M. Sraj, A. Masri, Z. Artail, and H. , A dynamic honeypot design for intrusion detection, International Conference on Pervasive Services (ICPS), pp.95-104, 2004.

M. H. Bhuyan, D. Bhattacharyya, and J. Kalita, Surveying Port Scans and Their Detection Methodologies, The Computer Journal, vol.54, issue.10, pp.1565-1581, 2011.
DOI : 10.1093/comjnl/bxr035

D. Merritt, Spear phishing attack detection Master's thesis, Air Force Institute of Technology, 2011.

F. Mouton, M. M. Malan, and H. S. Venter, Social engineering from a normative ethics perspective, 2013 Information Security for South Africa, pp.1-8, 2013.
DOI : 10.1109/ISSA.2013.6641064

M. Bezuidenhout, F. Mouton, and H. Venter, Social engineering attack detection model: SEADM, 2010 Information Security for South Africa, pp.1-8, 2010.
DOI : 10.1109/ISSA.2010.5588500

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

F. Mouton, M. Malan, and H. Venter, Development of cognitive functioning psychological measures for the seadm, In: Human Aspects of Information Security & Assurance, 2012.

F. Mouton, L. Leenen, M. M. Malan, and H. S. Venter, Towards an Ontological Model Defining the Social Engineering Domain, 11th Human Choice and Computers International Conference, 2014.
DOI : 10.1007/978-3-662-44208-1_22

URL : https://hal.archives-ouvertes.fr/hal-01383064

L. T. Heberlein, G. V. Dias, K. N. Levitt, B. Mukherjee, J. Wood et al., A network security monitor, Proceedings of Computer Society Symposium on Research in Security and Privacy, pp.296-304, 1990.

M. Christodorescu and S. Jha, Testing malware detectors, ACM SIGSOFT Software Engineering Notes, vol.29, issue.4, pp.34-44, 2004.
DOI : 10.1145/1013886.1007518

D. Owen, What is a false positive and why are false positives a problem? Online, 2010.

S. Manmadhan and T. Manesh, A Method of Detecting Sql Injection Attack to Secure Web Applications, International Journal of Distributed and Parallel systems, vol.3, issue.6, pp.1-8, 2012.
DOI : 10.5121/ijdps.2012.3601

A. Ciampa, C. A. Visaggio, D. Penta, and M. , A heuristic-based approach for detecting sqlinjection vulnerabilities in web applications, Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure Systems, pp.43-49, 2010.

W. Win and H. H. Htun, A simple and efficient framework for detection of sql injection attack, International Journal of Computer & Communication Engineering Research, vol.1, issue.2, pp.26-30, 2013.

T. Jim, N. Swamy, and M. Hicks, Defeating script injection attacks with browser-enforced embedded policies, Proceedings of the 16th international conference on World Wide Web , WWW '07, pp.601-610, 2007.
DOI : 10.1145/1242572.1242654

T. Scholte, W. Robertson, D. Balzarotti, and E. Kirda, An empirical analysis of input validation mechanisms in web applications and languages, Proceedings of the 27th Annual ACM Symposium on Applied Computing, SAC '12, pp.1419-1426, 2012.
DOI : 10.1145/2245276.2232004

T. Rao, Defending against web vulnerabilities and cross-site scripting, Journal of Global Research in Computer Science, vol.3, issue.5, pp.61-64, 2012.

D. Karig and R. Lee, Remote denial of service attacks and countermeasures, 2001.

J. Mirkovic and P. Reiher, A taxonomy of DDoS attack and DDoS defense mechanisms, ACM SIGCOMM Computer Communication Review, vol.34, issue.2, pp.39-53, 2004.
DOI : 10.1145/997150.997156

A. Bhide, E. N. Elnozahy, and S. P. Morgan, A highly available network file server, Proceedings of the 1991 USENIX Winter Conference, pp.199-205, 1991.

D. Yang, A. Usynin, and J. W. Hines, Anomaly-based intrusion detection for scada systems, 5th International Topical Meeting on Nuclear Plant Instrumentation, Control and Human Machine Interface Technologies (NPIC&HMIT 05, pp.12-16, 2006.

R. Gula, Correlating ids alerts with vulnerability information, Technical Report Revision Tenable Network Security, vol.4, 2011.