I. Agrafiotis, J. Nurse, M. Goldsmith, S. Creese, and D. Upton, A taxonomy of cyber-harms: Defining the impacts of cyberattacks and understanding how they propagate, Journal of Cybersecurity, issue.1, p.4, 2018.

A. Bendovschi, Cyber-Attacks -Trends, Patterns and Security Countermeasures. Procedia Economics and Finance, vol.28, pp.24-31, 2015.

I. Ghafir, V. Prenosil, and M. Hammoudeh, Botnet Command and Control Traffic Detection Challenges: A Correlation-based Solution, International Journal of Advances in Computer Networks and Its Security (IJCNS), vol.7, issue.2, pp.27-31, 2017.

E. Ignatuschtschenko, T. Roberts, and P. Cornish, Cyber Harm: Concepts, Taxonomy and Measurement, SSRN Electronic Journal, 2016.

. Bluefin, Cyber Attacks, 2018.

I. Ghafir, J. Svoboda, and V. Prenosil, Tor-based malware and Tor connection detection, International Conference on Frontiers of Communications, Networks and Applications, pp.1-6, 2014.

. Rapid7, Common Types of Cybersecurity Attacks and Hacking Techniques, 2019.

J. Svoboda, I. Ghafir, and V. Prenosil, Network Monitoring Approaches: An Overview, International Journal of Advances in Computer Networks and Its Security (IJCNS), vol.5, issue.2, pp.88-93, 2015.

J. Reo, Academic Research Reports Nearly 30,000 DoS Attacks per Day, 2019.

T. Mahjabin, Y. Xiao, G. Sun, and W. Jiang, A survey of a distributed denial-of-service attack, prevention, and mitigation techniques, International Journal of Distributed Sensor Networks, vol.13, issue.12, p.155014771774146, 2017.

I. Ghafir and V. Prenosil, DNS query failure and algorithmically generated domain-flux detection, International Conference on Frontiers of Communications, Networks and Applications, pp.1-5, 2014.

D. ;. Swinhoe and . Cso-online, What is a man-in-the-middle attack? How MitM attacks work and how to prevent them, 2019.

M. Conti, N. Dragoni, and V. Lesyk, A Survey of Man In The Middle Attacks, IEEE Communications Surveys & Tutorials, vol.18, issue.3, pp.2027-2051, 2016.

I. Ghafir and V. Prenosil, Malicious File Hash Detection and Driveby Download Attacks, International Conference on Computer and Communication Technologies, series Advances in Intelligent Systems and Computing, vol.379, pp.661-669, 2016.

. Veracode, Cross-Site Scripting (XSS) Tutorial: Learn About XSS Vulnerabilities, Injections and How to Prevent Attacks, 2019.

S. Fogie, J. Grossman, R. Hansen, A. Rager, and P. Petkov, XSS Attacks, 2014.

I. Ghafir, M. Husak, and V. Prenosil, A Survey on Intrusion Detection and Prevention Systems, IEEE/UREL conference, pp.10-14, 2014.

. Inside-out and . Security, 110 Must-Know Cybersecurity Statistics for 2020 | Varonis, 2019.

U. Raza, J. Lomax, I. Ghafir, R. Kharel, and B. Whiteside, An IoT and Business Processes Based Approach for the Monitoring and Control of High Value-Added Manufacturing Processes, International Conference on Future Networks and Distributed Systems, 2017.

I. Ghafir and V. Prenosil, Advanced Computer and Communication Engineering Technology, Lecture Notes in Electrical Engineering, vol.362, pp.73-80, 2016.

M. Simmonds, Beware the drive-by attack, Computer Fraud & Security, issue.10, pp.19-20, 2016.

. Selfkey, All Data Breaches in 2019 -An Alarming Timeline -SelfKey, 2019.

I. Ghafir, J. Svoboda, and V. Prenosil, A Survey on Botnet Command and Control Traffic Detection, International Journal of Advances in Computer Networks and Its Security (IJCNS), vol.5, issue.2, pp.75-80, 2015.

, Design of Password Guessing Prevention Protocol for Levelled-Security System, vol.8, issue.5, pp.3787-3791, 2018.

S. Hansman and R. Hunt, A taxonomy of network and computer attacks, Computers & Security, vol.24, issue.1, pp.31-43, 2005.

I. Ghafir, V. Prenosil, M. Hammoudeh, F. J. Aparicio-navarro, K. Rabie et al., Disguised Executable Files in Spear-Phishing Emails: Detecting the Point of Entry in Advanced Persistent Threat, International Conference on Future Networks and Distributed Systems, 2018.

M. Kjaerland, A taxonomy and comparison of computer securityincidents from the commercial and government sectors, Computers and Security, vol.25, pp.522-538, 2005.

I. Ghafir, V. Prenosil, M. Hammoudeh, and U. Raza, Malicious SSL Certificate Detection: A Step Towards Advanced Persistent Threat Defence, International Conference on Future Networks and Distributed Systems, 2017.

S. Hansman and R. Hunt, A taxonomy of network and computer attacks, Computer and Security, 2005.

J. Mirkovic and P. Reiher, A Taxonomy of DDoS Attack and DDoS Defense Mechanisms, ACM CCR, 2004.

I. Ghafir and V. Prenosil, Advanced Persistent Threat and Spear Phishing Emails, International Conference Distance Learning, Simulation and Communication, pp.34-41, 2015.

D. Lough, A Taxonomy of Computer Attacks with Applications to Wireless Networks, 2001.

J. D. Howard and T. A. Longstaff, A Common Language for Computer Security Incidents, 1998.

I. Ghafir, V. Prenosil, M. Hammoudeh, T. Baker, S. Jabbar et al., BotDet: A System for Real Time Botnet Command and Control Traffic Detection, IEEE Access (IF=4.098), vol.6, pp.1-12, 2018.

J. Carlson, Unidimensional Vertical Scaling in Multidimensional Space, ETS Research Report Series, vol.2017, issue.1, pp.1-28, 2017.

S. Levy, Facet Theory. Encyclopedia of Quality of Life and Well-Being Research, pp.2112-2119, 2014.