CSI/FBI (2007, 12, 03). The 12th Annual Computer Crime and Security Survey.
 OWASP: the open web application security project, “the ten most critical web application security risks. 2013
 M. Cherghi H. Medroumi and A. Souti, “ Inter –organizational workflow for Intelligent Audit of Information Technologiesin terms of Entreprise Business Processes” International Journal of Advanced Computer Science and Aplication, 5(5), 2014
 R. Latif, H. Abbas, S. Assar, Q. Ali, Cloud computing risk assessment: a systematic literature review, in: Future Information Technology, Springer,Berlin, Heidelberg, 2014, pp. 285–295.
 A. Mukhopadhyay, S. Chatterjee, D. Saha, A. Mahanti & S.K. Sadhukhan. (2006, 01, 07). e-Risk Management with Insurance : A framework using Copula aided Bayesian Belief Networks, Proceedings of the 39th Hawaii International Conference on System Sciences.
 F. Foroughi, « Information Security Risk Assessment by Using Bayesian Learning Technique”, Proceedings of the World Congress on Engineering 2008 Vol I WCE 2008, July 2 - 4, 2008, London, U.K.
 E. Loukis, D. Spinellis, “Information Systems Security in the Greek Public Sector”. Information Management and Computer Security 9(1), pp. 21–31, 2001.
 M. Myerson, “Risk Management Processes for Software Engineering Models”. Boston: Artech House, 1997.
 D. Spinellis, S. Kokolakis, S. Gritzalis, “Security requirements, risks and recommendations for small enterprise and home office environments”. Information Management & Computer Security 7(3), pp. 121-128, 1999.
 T. Tsiakis, “Information Security Expenditures: a Techno-Economic Analysis”, IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.4, April 2010
 W. Böhmer, “Evaluation of the Quality of an Information Security Management System (ISMS) or how secure is secure?”. Guest lecture at the Gjovik University College, 2006.
 B. Berger. (2003, 08, 20). Data-Centric Quantitative Computer Security Risk Assessment, [Online]. Available: http://www.sans.org/reading_room/whitepapers/auditin g/1209.php.
 L.B.A. Rabai , M. Jouini, A. Ben Aissa, A. Mili, « A cybersecurity model in cloud computing environments”, Journal of King Saud University – Computer and Information Sciences (2013) 25, 63–75
 A. Ben Aissa, R.K. Abercrombie, F.T. Sheldon, A. Mili, “Quantifying security threats and their potential impacts: a case study”. Innovation in Systems and Software Engineering: A NASA Journal 6, 269–281.2010 Amal Benfateh et al.
 X. Zhang, N. Wuwong, H. Li, “Information security risk management framework for the cloud computing environments”. In: 10th International Conference on Computer and Information Technology (CIT), pp. 1328–1334. 2010
 U. Akyazi and A.S.E. Uyar. Distributed intrusion detection using mobile agents against ddos attacks. In Computer and Information Sciences, 2008. ISCIS ’08. 23rd International Symposium on, pages 1-6, Oct 2008.
 Venkateshwaran K and Anu Malviya and Utkarsha Dikshit and S.Venkatesan. “Security Framework for Agent-Based Cloud Computing”. International Journal of Interactive Multimedia and Artificial Intelligence. Volume 3, number 3, 2015
 O. Demir, B. Khan, G. Ben Brahim, and A. Al-Fuqaha. Optimizing agent placement for flow reconstruction of ddos attacks. In Wireless Communications and Mobile ComputingC onference (IWCMC), 2013 9th International, pages 83-89, July 2013.
 M. Zamani, M. Movahedi, M. Ebadzadeh, and H. Pedram. A ddos-awareids model based on dangertheory and mobile agents. In Computational Intelligence and Security, 2009. CIS ’09. International Conference on, volume 1, pages 516-520, Dec 2009.
 M. Duraipandian and C. Palanisamy. An intelligent agent based defense architecture for ddos attacks. In Electronics and Communication Systems (ICECS), 2014 International Conference, pages 1-7, Feb 2014
 J. Canavan, “The Fundamentals of Network Security”. Boston: Artech House, 2001.