1. Val Thiagarajan, B.E.: BS 7799 Audit Checklist (2002), http://www.sans.org/score/checklists/ISO_17799_checklist.pdf
2. ISO IEC 27002 2005 Information Security Audit Tool(2005), http://www.praxiom.com/iso-17799-audit.htm
3. Stepanova, D., Parkin, S., Moorsel, A.: A knowledge Base For Justified Information Security Decision-Making. In: 4th International Conference on Software and Data Technologies (ICSOFT 2009), pp. 326–311 (2009)
4. Atymtayeva, L., Kozhakhmet, K., Bortsova, G., Inoue, A.: Methodology and Ontology of Expert System for Information Security Audit. In: Proceedings of the 6th International Conference on Soft Computing and Intelligent Systems and the 13th International Symposium on Advanced Intelligent Systems, Kobe, Japan, pp. 238–243 (2012)
5. Atymtayeva, L., Kozhakhmet, K., Bortsova, G.: Some Issues of Development of Intelligent System for Information Security Auditing. In: Proceedings of the International Conference of Computational Intelligence and Intelligent Systems 2012, London, UK, June 1-2, vol. 2, pp. 725–731 (2012)