1. Alhazmi, O. H., & Malaiya, Y. K. (2005). Modeling the Vulnerability Discover Process. In Proceedings of the 16th IEEE International Symposium on Software Reliability Engineering (pp.10-138). Las Vegas, NV: IEEE Computer Society Press.
2. Arora, A., Krishnan, R., Nandkumar, A., Telang, R., & Yang, Y. (2004). Impact of vulnerability disclosure and patch availability - Empirical analysis. In Proceedings of the 3rd Annual Workshop on Economics and Information Security (WEIS04). Retrieved January 05, 2013, from https://www.dtc.umn.edu/weis2004/telang.pdf
3. Blue Coat Systems, Inc. (2012). Blue coat systems 2012 web security report. Retrieved January 05, 2013, from http://www.bluecoat.com/sites/default/files/documents/files/BC_2012_Security_Report-v1i-optimized.pdf
4. Bocharov, P. P., D'Apice, C., & Pechinkin, A. V. (2003). Queueing theory. Berlin, Germany: Walter De Gruyter. Retrieved January 31, 2013, from http://www.degruyter.com/view/product/175787
5. Breierova, L., & Choudhari, M. (2001). An introduction to sensitivity analysis. Cambridge, MA: Massachusetts Institute of Technology. Retrieved November 14, 2012, from http://ocw.mit.edu/courses/sloan-school-of-management/15-988-system-dynamics-self-study-fall-1998-spring-1999/readings/sensitivityanalysis.pdf