1. Archibald, N., Ramirez, G., Rathaus, N., Burke, J., Caswell, B., & Deraison, R. 2015. Nessus. Snort, & Ethereal Power Tools: Customizing Open Source Security Applications, First Edition, Rockland, Syngress.;
2. Beale, J., Deraison, R., Meer, H., Temmingh, R., & Walt, C. V. D. 2004. Nessus network auditing. Syngress Publishing.;
3. Hug, G., & Giampapa, J. A. 2012. Vulnerability assessment of AC state estimation with respect to false data injection cyber-attacks. IEEE Transactions on Smart Grid, 3(3), 1362-1370.;
4. Krštenić, A. 2016. The application of cyber intelligence analysis in countering contemporary challenges, risks and threats. II međunarodna naučno-stručna konferencija bezbednost i krizni menadžment - teorija i praksa bezbednost za budućnost - 2016, pp. 171-177.;
5. Morein, W. G., Stavrou, A., Cook, D. L., Keromytis, A. D., Misra, V., & Rubenstein, D. 2003 October. Using graphic turing tests to counter automated DDoS attacks against web servers. In Proceedings of the 10th ACM conference on Computer and communications security (pp. 8-19). ACM.;