1. Clinton L (undated) Cyber-insurance metrics and impact on cyber-security. http://www.whitehouse.gov/files/documents/cyber/ISA-Cyber-InsuranceMetricandImpactonCyber-Security.pdf . Accessed Aug 2012
2. Common Weakness Enumeration (2012) CWE-89: improper neutralization of special elements used in an SQL command (‘SQL injection’). http://cwe.mitre.org/data/definitions/89.html . Accessed 13 Jan 2012
3. Common Weakness Enumeration (2012) CWE-79: improper neutralization of input during web page generation (‘cross-site scripting’). http://cwe.mitre.org/data/definitions/79.html . Accessed 13 Jan 2012
4. ENISA (2012) Incentives and barriers of the cyber insurance market in Europe June 2012. European Network and Information Security Agency (ENISA), Heraklion. http://www.enisa.europa.eu . Accessed 5 July 2012
5. Gould C, Su Z, Devanbu P (2044) Java database connectivity (JDBC) checker: a static analysis tool for SQL/JDBC applications. In: Proceedings of the 26th international conference on software engineering (ICSE 2004) formal demos, p 697–698. ICSE, Minneapolis