1. , , . 2004 CSI/FBI Computer Crime and Security Survey. Computer Security Institute/Federal Bureau of Investigation (CSI/FBI), available at: http://www.gocsi.com/awareness/fbi.jhtml
2. A modular approach to computer security risk management. Proceedings of the AFIPS Conference, vol. 48. 1979; 293-304.
3. Secure Computing. McGraw-Hill: New York, 1997.
4. . Managing Information Security Risks: the OCTAVE Approach. Addison Wesley Professional: Reading, MA, July 2002, ISBN: 0321118863.
5. , , , , , , . Model-based risk assessment in a component-based software engineering process: the CORAS approach to identify security risks. In Business Component-Based Software Engineering. (ed.). Kluwer Academic Publishers: Dordrecht, 2003; 189-207.