8Frederic Cuppens.Managing alerts in a multi-intrusion detection environment[].Proceedings of the th Annual Computer Security Applications Conference (ACSAC’).2001
9Stanton, J.M,Stam, K.R,Mastrangelo, P.Analysis of end-user securitybehaviours[].Computers and Security.2005
10Kenneth J.Knapp,Thomas E.Marshall.Information security policy:An organizational-level process model[].Computers and Security.2009