1. Aota, M., Kanehara, H., Kubo, M., Murata, N., Sun, B., Takahashi, T.: Automation of vulnerability classification from its description using machine learning. In: 2020 IEEE Symposium on Computers and Communications (ISCC), Rennes, France, pp. 1−7 (2020). https://doi.org/10.1109/ISCC50000.2020.9219568. Accessed 18 June 2023
2. Ene, C.: 10.5 Trillion Reasons Why We Need A United Response To Cyber Risk, 10.5 Trillion Reasons Why We Need A United Response To Cyber Risk (forbes.com). Accessed 19 June 2023
3. ISO/IEC 27001:2022, Third Edition: Information security, cybersecurity and privacy protection - Information security management systems - Requirements. International Organization for Standardization Switzerland. ISBN 13: 9789267113111
4. Maryska, M., Doucek, P., Nedomova, L.: Cyber_Insurance/Re_Insurance_and_Impact_of Covid_19. International Conference Liberec Economic Forum 2021. Technická Univerzita Liberec, Ekonomická fakulta, Liberec (2021)
5. Murray, A.T., Matisziw, T.C., Grubesic, T.H.: A methodological overview of network vulnerability analysis. Growth Change 39(4), 573–592 (2008). https://asu.elsevierpure.com/en/publications/a-methodological-overview-of-network-vulnerability-analysis. Accessed 18 June 2023