1. Behl A, Behl K, An Analysis of Cloud Computing Security Issues, In Proc. 2012 World Congress on Information and Communication Technologies, IEEE, Trivandrum, India, pp. 109-114, 30 Oct.-2 Nov. 2012;
2. Charney S, Rethinking the Cyber Threat: A Framework and Path Forward, Microsoft Corp., 2009;
3. Delgado A, Ensuring our Children's Safety While Connected, The US Air Force Central Command, 2015, [Internet], The WEB source: http://www.afcent.af.mil/Units/379thAirExpeditionaryWing/Ne ws/Display/tabid/298/Article/622136/ensuring-ourchildrens-safety-while-connected.aspx;
4. Booz Allen Hamilton, Cyber Operations Maturity Framework: A Model for Collaborative, Dynamic Cybersecurity, 2011;
5. Jason H, Cloud Attack: Unsharing Your Business in The Cloud, BrightTALK, 2015;