1. Alhazmi, O. H., Woo, S. W., & Malaiya, Y. K. (2006). Security vulnerability categories in major software systems. In Proceedings of the Third IASTED International Conference on Communication, Network, and Information Security (pp. 138-143). Cambridge, MA: IASTED/ACTA Press.
2. Arora, A., Krishnan, R., Telang, R., & Yang, Y. (2004). Impact of vulnerability disclosure and patch availability - An empirical analysis. Third Workshop on the Economics of Information Security.
3. Bugiel, S., Nürnberger, S., Pöppelmann, T., Sadeghi, A. R., & Schneider, T. (2011). AmazonIA: When elasticity snaps back. In Proceedings of the 18th ACM Conference on Computer and Communications Security, (pp 389-400). New York, NY: ACM.
4. Cellan-Jones, R. (2009). The sidekick cloud disaster. BBC News. Retrieved January 14, 2012, from http://www.bbc.co.uk/blogs/technology/2009/10/the_sidekick_cloud_disaster.html
5. Cloud Security Alliance. (2010). Top threats to cloud computing v1.0. Retrieved January 14, 2012, from https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf