1Abstracts of Articles on Protecting Computer Networks.http://usinfo.state.gov / journals/itps / 1 198/ijpe/pj48aler.htm.
2Center for Secure Information Systems (CSIS). http://www.isse.gmu.edu/-csis/.
3Common Vriteria for Information Technology Security. http://csrc.nist.gov/cc/ccv20/ccv21ist.htm.
4Hyland P C, Mason C G. Management of Network Security Applications. University ,TASC, Inc , 2000-04.
5Pickel J. Enabling Automated Detection of Security Events That Affect Multiple Administrative Domains. Carnegie Mellon University, Information Networking Institute, 2001-09.