1. Acquisti, A., John, L., & Loewenstein, G. (2010). What is privacy worth? http://www.futureofprivacy.org/wp-content/uploads/2010/07/privacy-worth-acquisti-FPF .
2. Alharby, A., & Imai, H. (2005). IDS false alarm reduction using continuous and discontinuous patterns. Lecture Notes in Computer Science, 3531, 192–205.
3. Baker, M., Turnbull, D., & Kaszuba, G. (2012). Finding needles in haystacks (the size of countries). http://media.blackhat.com/bh-eu-12/Baker/bh-eu-12-Baker-Needles_Haystacks-WP .
4. Berthold, S., & Böhme, R. (2010). Valuating privacy with option pricing theory. In T. Moore, D. Pym, & C. Ioannidis (Eds.), Economics of Information Security and Privacy (pp. 187–209). US: Springer.
5. Bicknell, P., & Jean, H. (2011). National information assurance partnership common criteria evaluation and validation scheme, validation report hp tippingpoint intrusion prevention systems. http://www.commoncriteriaportal.org/files/epfiles/st_vid10345-vr .