1. Balcerek, B., Szurgot, B., Uchroński, M., Waga, W., 2012. ACARM-ng: next generation correlation framework. In: Bubak, M., Szepieniec, T., Wiatr, K. (Eds.), Building a National Distributed e-Infrastructure – PL-Grid: Scientific and Technical Achievements Science, vol. 7136. Springer, Berlin, Heidelberg, pp. 114–127, ISBN: 978-3-642-28267-6.
2. AlertLogic, 2014. Cloud Security Report: Research on the Evolving State of Cloud Security. URL 〈https://www.alertlogic.com/resources/cloud-security-report/〉, May.
3. Alhamad, M., Dillon, T., Chang, E., 2010. SLA-based trust model for cloud computing. In: 2010 13th International Conference on Network-Based Information Systems (NBiS), pp. 321–324. http://dx.doi.org/10.1109/NBiS.2010.67.
4. Anderson, D., Frivold, T., Tamaru, A., Valdes, A., 1995. Next Generation Intrusion Detection Expert System (NIDES), Software Users Manual, May.
5. Ashford, W., 2015. Cyber Criminals Turn their Attention to Cloud Service Credentials. URL 〈http://www.computerweekly.com/news/2240241940/Cyber-criminals-turn-their-attention-to-cloud-service-credentials〉.