​1.3​ Non-Normative References

[CAPEC] Common Attack Pattern Enumeration and Classification (CAPEC). (2014, Nov. 7). The MITRE Corporation. [Online]. Available:http://capec.mitre.org.

[Casey 2007] Casey, T., Threat Agent Library Helps Identify Information Security Risks

September 2007. [Online]. Available:https://communities.intel.com/servlet/JiveServlet/downloadBody/1151-102-1-1111/Threat Agent Library_07-2202w.pdf.

[Casey 2015] Casey, T., “Understanding Cyberthreat Motivations to Improve Defense”, Intel, February 2015. [Online]. Available:https://communities.intel.com/servlet/JiveServlet/previewBody/23856-102-1-28290/understanding-cyberthreat-motivations-to-improve-defense-paper-l.pdf.

[Goessner 2007] Goessner, S., “JSONPath - XPath for JSON”, February 2007. [Online]. Available:

http://goessner.net/articles/JsonPath/.

[JSON Schema] OASIS Cyber Threat Intelligence (CTI) TC, “cti-stix2-json-schemas”, OASIS. [Online]. Available:https://github.com/oasis-open/cti-stix2-json-schemas.

[Mell 2005] Mell, P., Kent, K. and Nusbaum, J., “Guide to Malware Incident Prevention and Handling”, NIST Special Publication 800-83, November 2005. [Online]. Available:http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-83.pdf.

[VERIS] VERIS Community Database. (n.d.). [Online]. Available:http://vcdb.org/

results matching ""

    No results matching ""