1. Internet Storm Center Statistics. .
2. Grand Research Challenges in Information Security & Assurance. CRA; November 2003, .
3. Sindre G, Firesmith DG, Opdahl AL. A reuse-based approach to determining security requirements. In: Proceedings of the 9th international workshop on requirements engineering: foundation for software quality (REFSQ’03); 2003.
4. van Lamsweerde A. Elaborating security requirements by construction of intentional anti-models. In: Proceedings of the 26th Int’l Conf Software Eng (ICSE 04). IEEE CS Press; 2004.
5. Liu L, Yu E, Mylopoulos J. Security and privacy requirements analysis within a social setting. In: Proceeding of RE’03; 2003. p. 151–61.