--- tags: Documents title: Documents and links for WP2 --- ## Markdown links - Complex documents in markdown - https://medium.com/@krzysztofczarnecki/i-wrote-my-thesis-in-markdown-heres-how-it-went-3f60140dfe65 - https://www.zettlr.com/features - From markdown to doc - https://mrjoe.uk/convert-markdown-to-word-document/ - https://linuxhint.com/convert_document_markdown_microsoft_word/ - Software Quality Assessment - https://xin-xia.github.io/publication/scis181.pdf ## Security and Privacy Links - GSMA - https://www.gsma.com/iot/wp-content/uploads/2018/11/GSMA_Assessing-regulatory-requirements-of-privacy-management-for-members-offering-IoT-services-using-personal-data.pdf - Analysis of risk for privacy - https://www.researchgate.net/publication/324942420_Privacy_risk_analysis_in_the_IoT_domain/link/5e43ade1a6fdccd9659bdeec/download - Security and privacy report from EU (2017) - https://ec.europa.eu/information_society/newsroom/image/document/2017-15/final_report_20170113_v0_1_clean_778231E0-BC8E-B21F-18089F746A650D4D_44113.pdf - User Privacy Request in Internet of Things - https://www.ics.uci.edu/~kobsa/papers/2016-WFioT-Kobsa.pdf - What matters to users? - https://www.researchgate.net/publication/258499184_What_Matters_to_Users_Factors_that_Affect_Users_Willingness_to_Share_Information_with_Online_Advertisers/link/00b7d528bddb285707000000/download ## Carnegie Mellon Research Scientific paper: https://arxiv.org/abs/2002.04631 Website: https://www.iotsecurityprivacy.org/labels Spreadsheet explaining each label's field: https://docs.google.com/spreadsheets/d/1EZyCgs6tB4jxhQXVZE7UF0LchL3bYrseYFzNShS0Y88/edit#gid=0 Two label levels, the first label is glued on a IOT device while the second one contains more information and can be consulted online. ## STIX language Website and documentation https://oasis-open.github.io/cti-documentation/stix/intro.html Structured Threat Information Expression (STIX) is an open source language and serialization format used to exchange cyber threat intelligence (CTI). It is composed by different objects that interact with each other. Each object is serialized through a JSON file that represents the object itself and all of its properties. The data representation used to show how those objects interact one with each other is a graph. Nodes are the unique concepts of cyber-threat intelligence and they are called SDO. You can find an exhaustive list with in addition the relative explanation of them here: https://oasis-open.github.io/cti-documentation/stix/intro.html#stix-21-defines-18-stix-domain-objects-sdos Edges are the relationship objects or SRO. You can find an exhaustive list with in addition the relative explanation of them here: https://oasis-open.github.io/cti-documentation/stix/intro.html#stix-2-defines-two-stix-relationship-objects-sros Descriptive and intuitive videos What are objects? https://www.youtube.com/watch?v=iAnd3rApMcA What are the common properties between objects? https://www.youtube.com/watch?v=dv-Zt4k1zt0 How does versioning work? https://www.youtube.com/watch?v=s4c4PHUfttE