1. Howard, J.D. and Longstaff, T,A. (1998), A common language for computer security incidents. Sandia Report, Sandia National Laboratories.
2. Radatz, J. (1996), The IEEE standard dictionary of electrical and electronics terms. Sixth edition, Institute of Electrical and Electronics Engineers. New York, USA.
3. Penetrating an operating system: a study of VM/370 integrity;Attanasio;IBM System Journal,1976
4. Vijayaraghavan, G. and Kaner, C. (2003), Taxonomies, STAR EAST 2003, Orlando, Florida, USA.
5. Anderson, J.P. (1980), Computer security threat monitoring and surveillance, Technical Report Contract 79F296400, Washington.