1. Survivable network system analysis: A case study;Ellison;IEEE Softw.,1999
2. Kumar, V., Telang, R., and Mukhopadhyay, T. (2006, January 26–28). Enterprise Information Security: Who Should Manage it and How?. Proceedings of the 5th Annual Workshop on the Economics of Information Security (WEIS 2006), Cambridge, UK.
3. Earl, M.J. (1989). Management Strategies for Information Technology, Prentice-Hall, Inc.
4. Threats to information systems: Today’s reality, yesterday’s understanding;Loch;MIS Q.,1992
5. Evaluating security threats in mainframe and client/server environments;Ryan;Inf. Manag.,1997