1. Statistical Phrase-based Translation;Koehn,2003
2. How Much is Enough? A Risk-Management Approach to Computer Security;Hoo,2000
3. Fighting Computer Crime: A New Framework for Protecting Information;Parker,1998
4. VERIZON, VERIS community database. Last accessed: 21.11.2016.
5. CERT Coordination Center, CERT vulnerability notes database. Last accessed: 14.08.2017.