1. A Survey of Insider Attack Detection Research;Malek;Springer,2008
2. Working Group The Notorious Nine: Cloud Computing Top Threats in 2013;Top;Cloud Security Alliance,2013
3. Dynamics as a Biometric for Authentication;Fabian;Future Generation Computer Systems,2000
4. David G. Litten, Qualitative and Quantitative Risk Analysis. http://www.pm-primer.com/pmbok-qualitative-and-quantitative-risk-analysis, (2015), [Online; Accessed 19-Feb-2015].
5. User Identity Verification Via Mouse Dynamics;Clint;Information Sciences,2012