1. Developing a enterprise information security policy;Walton,2002
2. Choo, K.-K.R., R.G. Smith, and R. McCusker, Future directions in technology-enabled crime: 2007–09, in Research and Public Policy Series, Australian_Government, Editor. 2007, Australian Institute of Criminology
3. Software security engineering: toward unifying software engineering and security engineering;Zulkernine,2006
4. Konrad, S., B.H.C. Chengy, L.A. Campbell, and R. Wassermann, Using Security Patterns to Model and Analyze Security Requirements, in High Assurance Systems Workshop (RHAS 03) as part of the IEEE Joint International Conference on Requirements Engineering (RE 03): Monterey Bay, CA (USA).
5. Building security requirements with CLASP;Viega,2005