C. Skills-gap and . Isaca, http://www.isaca.org/cyber/PublishingImages/ Cybersecurity-Skills-Gap-1500.jpg (access date 03, p.3, 2017.

N. Miloslavskaya and A. Tolstoy, Application of Big Data, Fast Data, and Data Lake Concepts to Information Security Issues, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), pp.148-153, 2016.
DOI : 10.1109/W-FiCloud.2016.41

R. Bidou, Security operation center concepts & implementation, 2005.

N. Miloslavskaya, Security Operations Centers for Information Security Incident Management Vienna (Austria), Proceedings of the 4th International Conference, pp.131-138, 2016.

C. Sanders and J. Smith, Applied network security monitoring: collection, detection, and analysis

R. Bejtlich, Practice of network security monitoring, 2013.

J. Burnham, What is Security Intelligence and why does it matter today? URL: https://securityintelligence.com/what-is-security-intelligence-and-why-does-it-mattertoday

E. M. Hutchins, M. J. Clopperty, and R. V. Amin, Intelligence-driven computer network defense informed by analysis of adversary campaigns and Intrusion Kill Chains

S. Intelligence, Prevent fraud Achieve compliance. Preserve security URL: https://www.sas.com/en_us/software/fraud-security-intelligence.html (access date 03, p.3, 2017.

S. Vs, SIC: the difference of an Intelligence Driven Defense® Solution. A White Paper Presented by: Lockheed Martin Corporation, 2015.

G. B. White and R. E. Sward, Developing an Undergraduate Lab for Information Warfare and Computer Security, Proceeding of the IFIP TC11 WG11.8 First World Conference on Information Security Education, pp.163-170, 1999.

C. J. Armstrong and H. L. Armstrong, The Virtual Campus, Proceeding of the IFIP TC11 WG11.8 Second World Conference on Information Security Education. 12-14, pp.161-168, 2001.

D. Gritzalis, D. , and T. Tryfonas, Action Learning in Practice: Pilot delivery of an INFOSEC University laboratory course, Proceeding of the IFIP TC11 WG11.8 Second World Conference on Information Security Education, pp.12-14, 2001.

L. J. Hoffman, R. Dodge, T. Rosenberg, and D. Ragsdale, Information assurance laboratory innovations, Proceedings of the 7th Colloquium for Information Systems Security Education, 2003.

N. Miloslavskaya and A. Tolstoy, Network Security Scientific and Research Laboratory, Proceedings of the 3st World Conference on Information Security Education WISE3, 2003.
DOI : 10.1007/978-0-387-35694-5_22

A. Ismukhamedova, Y. Satimova, A. Nikiforov, and N. Miloslavskaya, Practical Studying of Wi-Fi Network Vulnerabilities|, Proceedings of the 3rd International Conference DIPDMWC2016. 1st International Workshop on Education for Secure Digital Information Processing, Data Mining and Wireless Communications (ESDIPDMWC2016), pp.227-232, 2016.
DOI : 10.1109/dipdmwc.2016.7529394

R. C. Dodge, B. Hay, and K. Nance, Using Virtualization to Create and Deploy Computer Security Lab Exercises, Proceeding of 6 th World Conference on Information Security Education (WISE6). IFIP, 2010.

A. Malyuk and N. Miloslavskaya, Information Security Theory for the Future Internet Rome (Italy Magic Quadrant for Organization Network Firewalls 2015, Proceedings of the 3rd international conference «Future Internet of Things and Cloud» Network-Firewalls.pdf (access date 03.03, pp.24-26, 2015.