1. Douligeris C, Mitrokotsa A: Ddos Attacks And Defense Mechanisms: Classification And State-Of-The-Art. Computer Networks 2004, 643–666.
2. Orgill GL, Romney GW, Bailey MG, Orgill PM: The Urgency for Effective User Privacy-education to Counter Social Engineering Attacks on Secure Computer Systems. Proceedings of the Conference on Information Technology Education, CITC5. 2004.
3. Krutz RL, Vines RD: Cloud Security: A Comprehensive Guide To Secure Cloud Computing. Wiley Publishing Inc., Indianapolis; 2010.
4. Enisa, “Cloud Computing – Benefits, risks and recommendations for information security” (2009)
5. Kandias M., Virvilis N., Gritzalis D., "The Insider Threat in Cloud Computing", in Proc. of the 6th International Conference on Critical Infrastructure Security (CRITIS-2011), Wolthusen S., et al. (Eds.), pp. 95–106, Springer, Switzerland, September 2011.