1. FP7 INTERSECTION Deliverable D.2.2: Identification and classification of vulnerabilities of network infrastructures (2008)
2. Flizikowski, A., et al.: On Applying Ontologies to Security and QoS Management in Heterogeneous Networks. In: Information Systems Architecture and Technology - Information Systems and Computer Communications Network, 189-200, ISBN 978-83-7493-416-9 (2008)
3. Michal, C., et al.: Ontology-based description of networks vulnerabilities. Polish Journal of Environmental Studies 5c (2008)
4. ISO/IEC 13335-1:2004, Information Technology Security Techniques Management of information and communications technology security Part 1: Concepts and models for information and communications technology security management
5. Shared Information/Data Model TeleManagement Forum (2002)