1. Chen, H., Al-Nashif, Y.B., Qu, G., Hariri, S.: Self-Configuration of Network Security. In: 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007), p. 97 (2007)
2. Oppenheimer, D.: The importance of understanding distributed system configuration. In: Proceedings of the 2003 Conference on Human Factors in Computer Systems Workshop (April 2003)
3. Patterson, D.A.: A simple way to estimate the cost of downtime. In: Proceedings of LISA: Sixteenth Systems Administration Conference, pp. 185–188. Usenix (2002)
4. Forrester Research, How To Manage Your Information Security Policy Framework (January 2006)
5. Verizon Business, Data Breach Investigations Report (2009)