1. Adeyinka O (2008) Internet attack methods and internet security technology, In: Second Asia international conference on modeling & simulation, AICMS 08, pp 77–82, 13–15 May 2008
2. Bodeau DJ, Graubart R, Fabius-Greene J (2010) Improving cyber security and mission assurance via cyber preparedness (cyber prep) levels, In: IEEE second international conference on social computing (socialcom), pp 1147–1152, 20–22 Aug 2010
3. National Institute of Standards and Technology (NIST) (2009) Recommended Security Controls for Federal Information Systems and Organizations, NIST Special Publication 800-53, Rev. 3, August 2009 (updated with errata May 1, 2010)
4. NIST (2010) Guide for applying the risk management framework to Federal information systems: a security life cycle approach, NIST SP 800-37 Revision 1, February 2010
5. Information Technology (IT) Governance Institute (ITGI), COBIT (Control Objectives for IT and Related Technology) (2007) V4.1