1. Aleem Saiqa Luiz Fernando Capretz and Faheem Ahmed. 2015. "Security Issues in Data Warehouse." arXiv preprint arXiv:1507.05644. Aleem Saiqa Luiz Fernando Capretz and Faheem Ahmed. 2015. "Security Issues in Data Warehouse." arXiv preprint arXiv:1507.05644.
2. CIA Triad. http://www.techrepublic.com/blog/it-security/the-cia-triad/ CIA Triad. http://www.techrepublic.com/blog/it-security/the-cia-triad/
3. Cisco. (2014 Jan.). The Internet of Things {Online}. Available: http://share.cisco.com/internet-of-things.html . Cisco. (2014 Jan.). The Internet of Things {Online}. Available: http://share.cisco.com/internet-of-things.html .
4. Dwork C. "Differential Privacy." http://research.microsoft.com/apps/pubs/default.aspx?id=64346. Dwork C. "Differential Privacy." http://research.microsoft.com/apps/pubs/default.aspx?id=64346.
5. Edwards B. Hofmeyr S. and Forrest S. 2015. Hype and heavy tails: A closer look at data breaches. WEIS. Edwards B. Hofmeyr S. and Forrest S. 2015. Hype and heavy tails: A closer look at data breaches. WEIS.