1. A roadmap for cybersecurity research (2009) (Technical Report) Department of Homeland Security (DHS).
2. Afek, Y., & Gafni, E. (1988). End-to-end communication in unreliable networks. In Proceedings of the 7th annual ACM symposium on the principles of distributed computing, Toronto, Canada (pp. 131–148).
3. Avizienis, A., Laprie, J. C., Randell, B., & Landwehr, C. (2004). Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 1(1), 11–33.
4. Bhattacharjee, B., Calvert, K., Griffioen, J., Spring, N., & Sterbenz, J. P. G. (2006). Postmodern Internetwork Architecture (Technical Report ITTC-FY2006-TR-45030-01). University of Kansas, Lawrence, KS.
5. Burleigh, S., Hooke, A., Torgerson, L., Fall, K., Cerf, V., Durst, B., Scott, K., & Weiss, H. (2003). Delay-tolerant networking: an approach to interplanetary Internet. IEEE Communications Magazine, 41(6), 128–136.