1. European Union Agency for Network and Information Security (ENISA), ENISA Threat Landscape 2015. URL , 2016 (accessed November 29, 2016).
2. Clear and present danger: interventive and retaliatory approaches to cyber threats;Bernardo;Appl. Comput. Infor.,2015
3. R. Meyer, Detecting Attacks on Web Applications from Log Files. URL , 2008 (accessed December 12, 2016).
4. D.B. Cid, Log Analysis using OSSEC. URL , 2007 (accessed November 29, 2016).