[[1] M. T. Chapman, Establishing metrics to manage the human layer, ISSA Security Education Awareness Special Interest Group, 2013.]Search in Google Scholar
[[2] M. T. Chapman, Advanced Persistent Testing: How to fight bad phishing with good, PhishLine, 2015. http://www.phishline.com/advanced-persistent-testing-ebook]Search in Google Scholar
[[3] S. E. Edwards, R. Ford, G. Szappanos, Effectively testing APT defenses, Virus Bulletin Conference, Prague, Czech Republic, 2015.]Search in Google Scholar
[[4] K. Hadarics, K. Györffy, B. Nagy, L. Bognár, A. Arrott, F. Leitold, Mathematical Model of Distributed Vulnerability Assessment, In: Jaroslav Dočkal, Milan Jirsa, Josef Kaderka, Proceedings of Conference SPI 2017: Security and Protection of Information. Brno, 2017.07.01-2017.07.02. Brno: University of Defence, (2017), 45–57. (ISBN:978-80-7231-414-0)]Search in Google Scholar
[[5] F. Lalonde Levesque, J. M. Fernandez, A. Somayaji, Risk prediction of malware victimization based on user behavior, Malicious and Unwanted Software: The Americas (MALWARE), 2014 9th International Conference on. IEEE, 2014.10.1109/MALWARE.2014.6999412]Search in Google Scholar
[[6] F. Leitold, A. Arrott, K. Hadarics, Quantifying cyber-threat vulnerability by combining threat intelligence, IT infrastructure weakness, and user susceptibility, 24th Annual EICAR Conference, Nuremberg, Germany, 2016.]Search in Google Scholar
[[7] F. Leitold, K. Hadarics, Measuring security risk in the cloud-enabled enterprise, In: Dr Fernando C Colon Osorio, 7th International Conference on Malicious and Unwanted Software (MALWARE), Fajardo, Puerto Rico, 2012.10.16-2012.10.18. Piscataway (NJ): IEEE, (2012), 62–66. (ISBN:978-1-4673-4880-5)]Search in Google Scholar
[[8] NIST SP 800-53r4 Security and Privacy Controls for Federal Information Systems and Organizations, 2013.]Search in Google Scholar
[[9] NIST SP 800-83r1 Guide to Malware Incident Prevention and Handling for Desktops and Laptops, 2013.]Search in Google Scholar
[[10] Pwnie Express, Vulnerability assessment and penetration testing across the enterprise, Whitepaper, 2014. http://www.pwnieexpress.com]Search in Google Scholar