1. ‘A discussion of threat behavior: Attackers & patterns’ http://www.microsoft.com/en‐us/download/details.aspx?id=29989 accessed April2012
2. Gencer E. Ketil S.: ‘Risk‐driven security testing versus test‐driven security risk analysis’.Proc. Int. Conf. Doctoral Symp. on Engineering Secure Software and Systems Eindhoven The Netherlands February2012 pp.5–10
3. ‘Common vulnerabilities and exposures’ http://cve.mitre.org accessed April2014
4. Common vulnerability scoring system;Peter M.;IEEE Sec. Priv.,2006
5. Pengsu C. Lingyu W. Jajodia S. Singhal A.: ‘Aggregating CVSS base scores for semantics‐rich network security metrics’.Proc. Int. Conf. Int. Symp. on Reliable Distributed Systems California USA October2012 pp.31–40