1. Josang, A., Pope, S.: Dempster’s rule as seen by little coloured balls. Comput. Intell. 28(4), 453–474 (2012)
2. MacDermott, Á., Shi, Q., Kifayat, K.: Collaborative intrusion detection in a federated Cloud environment using the Dempster-Shafer theory of evidence. In: European Conference on Information Warfare and Security, ECCWS (2015)
3. MacDermott, Á., Shi, Q., Kifayat, K.: Collaborative intrusion detection in federated cloud environments. J. Comput. Sci. Appl. Big Data Anal. Intell. Syst. 3(3A), 10–20 (2015)
4. Rak, M., Ficco, M., Luna, J., Ghani, H., Suri, N., Panica, S., Petcu, D.: Security issues in cloud federations. In: Achieving Federated and Self-Manageable Cloud Infrastructures: Theory and Practice, pp. 176–194 (2012).
http://doi.org/10.4018/978-1-4666-1631-8.ch010
5. Ten, C.W., Manimaran, G., Liu, C.C.: Cybersecurity for critical infrastructures: attack and defense modeling. IEEE Trans. Syst. Man Cybern. Part A: Syst. Hum. 40(4), 853–865 (2010).
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5477189