1. Mobile cloud computing: a survey, state of art and future directions;Rahimi;Mob. Netw. Appl.,2014
2. Cooperative solutions for bring your own device (byod);Jaramillo;IBM J. Res. Dev.,2013
3. Common cybersecurity vulnerabilities in industrial control systems. (https://ics-cert.us-cert.gov/sites/default/files/documents/DHS_Common_Cybersecurity_Vulnerabilities_ICS_2010.pdf), 2011.
4. G. Stevens, Data security breach notification laws. (http://fas.org/sgp/crs/misc/R42475.pdf), 2012.
5. Assessment of disclosure risk;Duncan,2011