1. Abowd, G. D., Atkenson, C. G., Hong, J., Long, S., Kooper, R., & Pinkerton, M. (1997). Cyberguide: A mobile context-aware tour guide. Journal of Wireless Networks.
2. A threat model approach for classification of network layer attacks in WSN.;B.Arora;International Journal of Computers and Applications,2013
3. Ben-Tzur, C. (2007, March 27). Threat modelling With STRIDE and DREAD. Retrieved February 27, 2014, from http://www.slideshare.net/chuckbt/stride-and-dread
4. Security for Web Services and Service-Oriented Architectures
5. Blum, M. L. (2005). Real-time context recognition. Zurich, Switzerland: Swiss Federal Institute of Technology (ETH).