1. Aagedal, Jan Øyvind, Den Braber, Folker, Dimitrakos, Theo, Gran, Bjørn Axel, Raptis, Dimitris, and Stolen, Ketil. 2002. Model-based risk assessment to improve enterprise security. In Proceedings of the 5th IEEE international enterprise object computing conference, 51–62. Lausanne.
2. Ackermann, Tobias, and Buxmann, Peter. 2010. Quantifying risks in service networks: Using probability distributions for the evaluation of optimal security levels. In Proceedings of the Americas conference on information systems. Lima, Peru.
3. Akinrolabu, Olusola, Steve New, and Andrew Martin. 2018. Cyber supply chain risks in cloud computing—Bridging the risk assessment gap. Open Journal of Cloud Computing 5 (1): 1–19.
4. Amin, Saurabh, Galina A. Schwartz, and Alefiya Hussain. 2013. In quest of benchmarking security risks to cyber-physical systems. IEEE Network 27 (1): 19–24.
5. Amiri, Amin Khodabandeh, Cavusoglu, Hasan, and Benbasat, Izak. 2014. When is IT unavailability a strategic risk? A study in the context of cloud computing. In Proceedings of the 35th international conference on information systems. Auckland.