1. LOCKSTEP Consulting. A Guide for Government Agencies Calculating ROSI. Technical report, http://lockstep.com.au/library/return_on_investment.
2. ISO/IEC 27005 Information technology -- Security techniques -- Information security risk management. Tech. rep., 2008.
3. SDL Team Microsoft. Attack Surface Analyzer 1.0, http://blogs.msdn.com/b/sdl/archive/2012/08/02/attack-surface-analyzer-1-0-released.aspx.
4. Benini, M., and Sicari, S. Assessing the risk of intercepting voip calls. Computer Networks 52, 12 (2008), 2432--2446.
5. Chikha, B., Jabeur, R., Abbes, T., and Bouhoula, A. A spit detection algorithm based on user's call behavior. In Software, Telecommunications and Computer Networks (SoftCOM), 2013 21st International Conference on (2013), IEEE, pp. 1--5.