1. Axelrad, E.T., Sticha, P.J., Brdiczka, O., Shen, J. (2013). A bayesian network model for predicting insider threats. In: 2013 IEEE Security and Privacy Workshops, https://www.ieee-security.org/TC/SPW2013/papers/data/5017a082.pdf
2. Basu, R., Cunningham, R.K., Webster, S.E., Lippmann, R.P. (2001). Detecting low-profile probes and novel denial-of-service attacks. Tech. rep., IEEE SMC IA&S Workshop 2001, West Point, New York, USA.
3. BBC (2013) China IP address link to South Korea cyber-attack. http://www.bbc.co.uk/news/world-asia-21873017
4. BBC (2014) Hack attack causes ’massive damage’ at steel works. http://www.bbc.co.uk/news/technology-30575104
5. Berk, V.H., Cybenko, G., Souza, I.G.D., Murphy, J.P. (2012). Managing malicious insider risk through bandit. In: System Science (HICSS), 2012 45th Hawaii International Conference on IEEE (pp. 2422–2430).