1. Computational intelligence in information assurance and security, Studies in Computational Intelligence, vol. 57;Nedjah,2007
2. A systematic approach to multi-stage network attack analysis;Dawkins,2004
3. Classification of computer attacks using a self-organizing map;DeLooze,2004
4. G. Corral New Challenges in Detection and Management of Security Vulnerabilities in Data Networks. Ph.D. thesis, Enginyeria i Arquitectura La Salle, Universitat Ramon Llull, 2009.
5. IBM Global Technology Services, Ibm internet security systems x-force 2009 mid-year trend and risk report, IBM Corporation, 2009.