R. S. Ross, Managing Information Security Risk: Organization, Mission, and Information System View | NIST, Special Publication (NIST SP), 2011.

E. M. Hutchins, M. J. Cloppert, and R. M. Amin, Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains, 2011.

A. Command-Five-Pty-Ltd, Advanced Persistent Threats: A Decade in Review, 2011.

P. Pols, The Unified Kill Chain: Designing a Unified Kill Chain for Analyzing, Comparing and Defending against Cyber Attacks, 2017.

A. Melani-Govcert-ch, APT Case RUAG: Technical Report
URL : https://www.melani.admin.ch/dam/melani/en/dokumente/2016/technical%20report%20ruag.pdf

B. E. Strom, J. A. Battaglia, M. S. Kemmerer, W. Kupersanin, D. P. Miller et al., Finding cyber threats with ATT&CK-based analytics, 2017.

F. Maymi, R. Bixler, R. Jones, S. Lathrop, Towards a definition of cyberspace tactics, techniques and procedures, IEEE International Conference on Big Data, pp.4674-4679, 2017.
DOI : 10.1109/BigData.2017.8258514

M. R. Endsley, Toward a Theory of Situation Awareness in Dynamic Systems, Human Factors, vol.37, issue.1, pp.32-64, 1995.
DOI : 10.1518/001872095779049543

U. S. House-of-Representatives, The Equifax Data Breach, pp.31-39, 2018.
URL : https://republicans-oversight.house.gov/wp-content/uploads/2018/12/Equifax-Report.pdf

A. ANSSI, Retour technique de l'incident de TV5Monde, SSTIC, 2017.
URL : https://www.sstic.org/2017/presentation/2017_cloture/

M. Suiche, Lessons from TV5Monde 2015 Hack, 2017.
URL : https://blog.comae.io/lessons-from-tv5monde-2015-hack-c4d62f07849d