1. Mell, P., Scarfone, K., Romanosky, S.: A complete guide to the common vulnerability scoring system version 2.0, p. 123. Published by FIRST-Forum of Incident Response and Security Teams (2007)
2. Defense in Depth.
http://www.nsa.gov/ia/_files/support/defenseindepth.pdf
. Accessed on 08 January 2016
3. Pescatore, J.: Application Security: Tools for Getting Management Support and Funding. White Paper, SANS Institute (2013)
4. Finifter, M., Devdatta, A., David, W.: An empirical study of vulnerability rewards programs. In: Proceedings of the 22nd USENIX Security Symposium, Washington, pp. 273–288 (2013)
5. Reading, D.: Connecting The Information Security Community.
http://www.darkreading.com/coordinated-disclosure-bug-bounties-help-speed-patches/d/d-id/1139551