1. Bilger B et al (2013) Software Defined Perimeter. Technical report, Cloud Security Alliance
2. Brownlee J (2011) Clever algorithms: nature-inspired programming recipes. Lulu.com
3. CVSS (2015) Common vulnerability scoring system v3.0.
https://www.first.org/cvss/specification-document
4. Fielder A et al (2016) Decision support approaches for cyber security investment. Decis Support Syst 86:13–23
5. Frei S (2009) Security econometrics the dynamics of (in) security. PhD thesis, ETH ZURICH