2Matt Whipp. Black market thrives on vulnerability trading[EB/ O L ] . ( 2006 / 3 / 7) [ 2009/ 8 /1] .h ttp : / / www.pcpro.co. uk / news / 84523 / black-market-thfives-on-vulnerability-trading.html.
3Sutton, Michael, and Frank Nagle. Emerging Economic Models for Vulnerability Research[EB/OL]. [2009/8/1]. http://weis2006. econinfosec.org/docs/17.pdf.
4Anderson, R.Why Information Security Is Hard--an Economic Perspective[EB/OL].(2001/12/14) [2009/8/1]. http://www.acsac. org/2001/abstracts/thu-1530-b-anderson.html.
5Anderson, Ross, and Tyler Moore. The Economics of Information Security[J]. Science, 2006,314:610-613.
6Schneier. Economics and Information Security [EB/OL].(2006 /6/29)[2009/8/1]. http://www.schneier.com/blog/archives/2006/06/ economics_and_i_1.html.
7Jaziar Radianti, Jose. J. Gonzalez. Understanding Hidden Information Security Threats:The Vulnerability Black Market[A]. Proceedings of the 40th Hawaii International Conference on System Sciences-2007 [C]. Washington: IEEE Computer Society,2007.
8Rainer Bohme.A Comparison of Market Approaches to Software Vulnerability Disclosure[A]. Emerging Trends in Information and Communication Security[C]. Heidelberg: Springer,2006:298-311.