1. Clustering analysis,1980
2. A survey on policy languages in network and security management;Computer Networks,2012
3. Johnson, C.S., Feldman, L. and Witte, G.A. (2017), “Cyber threat intelligence and information sharing”, Technical report.
4. Guide to cyber threat information sharing;NIST Special Publication,2016
5. Platform for enterprise privacy practices: privacy-enabled management of customer data,2002