In deze paragraaf vind u een lijst met wetenschappelijke publicaties die hebben bijgedragen aan het ontwikkelde Cloud Software Engineering gedachtegoed. In het kenniscentrum worden diverse raamwerken gehanteerd. Bijvoorbeeld voor het Software Security deel wordt het Cybersecurity Framework van het National Institute of Standards and Technology (NIST) gebruikt.

Onderzoek

Arkin, B., Stender, S., & McGraw, G. (2005). Software penetration testing. IEEE Security & Privacy3(1), 84-87.

Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials18(2), 1153-1176.

Dua, S., & Du, X. (2016). Data mining and machine learning in cybersecurity. CRC press.

Engebretson, P. (2013). The basics of hacking and penetration testing: ethical hacking and penetration testing made easy. Elsevier.

Gordon, L. A., & Loeb, M. P. (2006). Managing cybersecurity resources: a cost-benefit analysis (Vol. 1). New York: McGraw-Hill.

Grobauer, B., Walloschek, T., & Stocker, E. (2011). Understanding cloud computing vulnerabilities. IEEE Security & Privacy9(2), 50-57.

Maynor, D. (2011). Metasploit toolkit for penetration testing, exploit development, and vulnerability research. Elsevier.

McDermott, J. P. (2001, February). Attack net penetration testing. In Proceedings of the 2000 workshop on New security paradigms (pp. 15-21). ACM.

Mowbray, T. J. (2013). Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions. John Wiley & Sons.

Singer, P. W., & Friedman, A. (2014). Cybersecurity: What everyone needs to know. Oxford University Press.

Shackelford, S. J., Proia, A. A., Martell, B., & Craig, A. N. (2015). Toward a global cybersecurity standard of care: Exploring the implications of the 2014 NIST Cybersecurity Framework on shaping reasonable national and international cybersecurity practices. Tex. Int'l LJ50, 305.

Smith, A. D., & Rupp, W. T. (2002). Issues in cybersecurity; understanding the potential risks associated with hackers/crackers. Information Management & Computer Security10(4), 178-183.

Staaij, R. van der (2014) Handboek identity & access management, Den Haag : Academic Service

Ten, C. W., Manimaran, G., & Liu, C. C. (2010). Cybersecurity for critical infrastructures: Attack and defense modeling. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans40(4), 853-865.

Vlietland, J., & van Vliet, H. (2014). Information sharing for effective IT incident resolving in IT service provider networks: A financial service case study. Journal of Software: Evolution and Process

Vlietland, J., & van Vliet, H. (2014). Improving IT incident handling performance with information visibility. Journal of Software: Evolution and Process, 2014(26), 1106–1127.

Weidman, G. (2014). Penetration testing: a hands-on introduction to hacking. No Starch Press.

Whitaker, A., & Newman, D. P. (2005). Penetration testing and network defense. Cisco Press.

Wilhelm, T. (2009). Professional penetration testing: creating and operating a formal hacking lab. Syngress Publishing.