---
tags: Documents
title: Documents and links for WP2
---
## Markdown links
- Complex documents in markdown
- https://medium.com/@krzysztofczarnecki/i-wrote-my-thesis-in-markdown-heres-how-it-went-3f60140dfe65
- https://www.zettlr.com/features
- From markdown to doc
- https://mrjoe.uk/convert-markdown-to-word-document/
- https://linuxhint.com/convert_document_markdown_microsoft_word/
- Software Quality Assessment
- https://xin-xia.github.io/publication/scis181.pdf
## Security and Privacy Links
- GSMA
- https://www.gsma.com/iot/wp-content/uploads/2018/11/GSMA_Assessing-regulatory-requirements-of-privacy-management-for-members-offering-IoT-services-using-personal-data.pdf
- Analysis of risk for privacy
- https://www.researchgate.net/publication/324942420_Privacy_risk_analysis_in_the_IoT_domain/link/5e43ade1a6fdccd9659bdeec/download
- Security and privacy report from EU (2017)
- https://ec.europa.eu/information_society/newsroom/image/document/2017-15/final_report_20170113_v0_1_clean_778231E0-BC8E-B21F-18089F746A650D4D_44113.pdf
- User Privacy Request in Internet of Things
- https://www.ics.uci.edu/~kobsa/papers/2016-WFioT-Kobsa.pdf
- What matters to users?
- https://www.researchgate.net/publication/258499184_What_Matters_to_Users_Factors_that_Affect_Users_Willingness_to_Share_Information_with_Online_Advertisers/link/00b7d528bddb285707000000/download
## Carnegie Mellon Research
Scientific paper: https://arxiv.org/abs/2002.04631
Website: https://www.iotsecurityprivacy.org/labels
Spreadsheet explaining each label's field: https://docs.google.com/spreadsheets/d/1EZyCgs6tB4jxhQXVZE7UF0LchL3bYrseYFzNShS0Y88/edit#gid=0
Two label levels, the first label is glued on a IOT device while the second one contains more information and can be consulted online.
## STIX language
Website and documentation
https://oasis-open.github.io/cti-documentation/stix/intro.html
Structured Threat Information Expression (STIX) is an open source language and serialization format used to exchange cyber threat intelligence (CTI).
It is composed by different objects that interact with each other. Each object is serialized through a JSON file that represents the object itself and all of its properties.
The data representation used to show how those objects interact one with each other is a graph.
Nodes are the unique concepts of cyber-threat intelligence and they are called SDO. You can find an exhaustive list with in addition the relative explanation of them here:
https://oasis-open.github.io/cti-documentation/stix/intro.html#stix-21-defines-18-stix-domain-objects-sdos
Edges are the relationship objects or SRO. You can find an exhaustive list with in addition the relative explanation of them here:
https://oasis-open.github.io/cti-documentation/stix/intro.html#stix-2-defines-two-stix-relationship-objects-sros
Descriptive and intuitive videos
What are objects? https://www.youtube.com/watch?v=iAnd3rApMcA
What are the common properties between objects? https://www.youtube.com/watch?v=dv-Zt4k1zt0
How does versioning work? https://www.youtube.com/watch?v=s4c4PHUfttE