A. Torres, Building a world-class security operations center: A roadmap, https://sibertor.com/wpcontent/uploads/2016/07/building-world-class-security-operations-center-roadmap-35907.pdf.
 Bank Negara Malaysia, Risk Management in Technology (RMiT), 2018.
 C. Crowley, Future SOC: SANS 2017 Security Operations Center Survey, 2017.
 C. Onwubiko, Cyber security operations centre: Security monitoring for protecting business and supporting cyber defense strategy, Int. Conf. Cyber Sit. Awar. Data Anal. Asses. 2015.
 F. D. Janos and N. H. P. Dai, Security concerns towards security operations centers, SACI 2018-IEEE 12th International Symposium on Applied Computational Intelligence and Informatics, Proceedings, (2018) 273–278.
 Frost & Sullivan, The 2017 Global Information Security Workforce Study: Benchmarking Workforce Capacity and Response to Cyber Risk,” Frost & Sullivan in partnership with Booz Allen Hamilton for ISC2, (2017) 1–8.
 ISACA, COBIT 5: An Introduction, 2012.
 ISO/IEC, Information Technology – Security Techniques – Information Security Management Systems – Requirements (ISO/IEC 27001:2013), 2013.
 J. Shenk, Ninth Log Management Survey Report, 2014.
 M. Grobler, P. Jacobs and B. van Niekerk, Cyber security centres for threat detection and mitigation, Threat Mit. Det. Cyber Warf. Terr. Act. (2014) 21–51.
 M. Nabil, S. Soukainat, A. Lakbabi and O. Ghizlane, SIEM selection criteria for an efficient contextual security, Int. Symp. Networks, Comput. Comm. (2017) 1–6
 M. Townsend, How a crippling shortage of analysts let the London Bridge attackers through, 2017.
 NetIQ, Service Level Agreement Guide, 2016.
 NIST, Cybersecurity Framework’s Five Functions, (2018)
 N. Miloslavskaya, Security operations centers for information security incident management, Proceedings - 2016 IEEE 4th International Conference on Future Internet of Things and Cloud, FiCloud (2016) 131–138.
 P. A. Networks, Build a Next-Generation SOC Techbrief, 2011.
 P. Cichonski, Computer Security Incident Handling Guide: Recommendations of the National Institute of Standards and Technology, NIST Special Pub. 79 (2012) 800–861.
 S. Bhatt, P. K. Manadhata, and L. Zomlot, The operational role of security information and event management systems, IEEE Security and Privacy, 12(5) (2014) 35–41.
 S. Kowtha, L. A. Nolan and R. A. Daley, Cyber security operations center characterization model and analysis, IEEE International Conference on Technologies for Homeland Security, HST, (2012) 470–475.
 S. Schinagl, K. Schoon and R. Paans, A framework for designing a security operations centre (SOC), Proc. Annual Hawaii Int. Conf. Sys. Sci. (2015) 2253–2262.
 S. Yuan and C. Zou, The security operations center based on correlation analysis, IEEE 3rd Int. Conf. Comm. Soft. Netw. (2011) 334–337.
 Symantec, Internet Security Threat Report, 2017.