1. Alberts, C., & Dorofee, A. (2002). Managing Information Security Risks, Pearson Education (US). https://www.ebook.de/de/product/3252338/christopher_alberts_audrey_dorofee_managing_information_security_risks.html. Accessed 12 Oct 2021
2. Alhazmi, O. H., Malaiya, Y. K., & Ray, I. (2007). Measuring, analyzing and predicting security vulnerabilities in software systems. Computers and Security, 26(3), 219–228. https://doi.org/10.1016/j.cose.2006.10.002
3. Allende, H., Moraga, C., & Salas, R. (2002). Artificial neural networks in time series forecasting: a comparative analysis. Kybernetika (88), 685–707
4. Arora, A., Telang, R., & Xu, H. (2008). Optimal policy for software vulnerability disclosure. Management Science, (54(4), 642–656. https://doi.org/10.1287/mnsc.1070.0771
5. Austin, R. D., & Darby, C. A. R. (2003). The myth of secure computing. Harvard Business Review (81:6), Harvard Business School Publication Corp., pp. 120–126