Managing Information Security Risk: Organization, Mission, and Information System View | NIST, Special Publication (NIST SP), 2011. ,
Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains, 2011. ,
Advanced Persistent Threats: A Decade in Review, 2011. ,
The Unified Kill Chain: Designing a Unified Kill Chain for Analyzing, Comparing and Defending against Cyber Attacks, 2017. ,
APT Case RUAG: Technical Report ,
URL : https://www.melani.admin.ch/dam/melani/en/dokumente/2016/technical%20report%20ruag.pdf
Finding cyber threats with ATT&CK-based analytics, 2017. ,
Towards a definition of cyberspace tactics, techniques and procedures, IEEE International Conference on Big Data, pp.4674-4679, 2017. ,
DOI : 10.1109/BigData.2017.8258514
Toward a Theory of Situation Awareness in Dynamic Systems, Human Factors, vol.37, issue.1, pp.32-64, 1995. ,
DOI : 10.1518/001872095779049543
The Equifax Data Breach, pp.31-39, 2018. ,
URL : https://republicans-oversight.house.gov/wp-content/uploads/2018/12/Equifax-Report.pdf
Retour technique de l'incident de TV5Monde, SSTIC, 2017. ,
URL : https://www.sstic.org/2017/presentation/2017_cloture/
, Lessons from TV5Monde 2015 Hack, 2017.
URL : https://blog.comae.io/lessons-from-tv5monde-2015-hack-c4d62f07849d