1. Gartner, IT Glosary, Gartner, Inc. (2015). http://www.gartner.com/it-glossary/context-aware-security .
2. Davis, A. (2014). Security Think Tank: Context-aware security is about more than buying technology, Computerweekly.com.
3. Garcia-Teodoro, P., Diaz-Verdejo, J., Maciá-Fernández, G., & Vázquez, E. (2009). Anomaly-based network intrusion detection: Techniques, systems and challenges. The International Source of Innovation for the Information Security and IT Audit Professional (Computers & security Journal). Elsevier, 28, 18–28.
4. Cuadra, A., & Ramos, A. J. J. (2014). Proposal of a new information-theory based technique and analysis of traffic anomaly detection. In IEEE International Conference on Smart Communications in Network Technologies (SaCoNeT) (Vol. 1, pp. 1–6).
5. Cuppens, F., & Cuppens-Boulahia, N. (2008). Modeling contextual security policies. International Journal of Information Security, Springer, 7, 285–305.