- نقیان فشارکی، مهدی، "ارائهمعماریمرجعامنیتیمحیطرایانشابرخصوصیسازمان"، فصلنامه علمی- پژوهشی امنیت پژوهی، (1393).
- ولوی، محمدرضا، (1394)، "ارائه الگوی امن استقرار زیرساختهای دفاعی کشور در محیط رایانش ابری"، فصلنامه علمی پژوهشی مطالعات بینرشتهای راهبردی، دانشگاه عالی دفاع ملی، تهران.
- Arifeen, F. U., Siddiqui, R. A., Ashraf, S., & Waheed, S. (2015). "Inter-Cloud Authentication through X. 509 for defense organization". Paper presented at the 2015 12th International Bhurban Conference on Applied Sciences and Technology (IBCAST).
- B., Wong, R. K., Ghanavati, M., & Chi, C. H. (2014). "Privacy as a service in social network communications". Paper presented at the Services Computing (SCC), 2014 IEEE International Conference on.
- Chung, C.-J., Xing, T., Huang, D., Medhi, D., & Trivedi, K. (2015). "SeReNe: on establishing secure and resilient networking services for an SDN-based multi-tenant datacenter environment". Paper presented at the 2015 IEEE International Conference on Dependable Systems and Networks Workshops.
- D. Sun, G. Chang, L. Sun, X. Wang, (2011), “Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments”, Procedia Engineering, vol. 15, 2852-2856.
- Karabacak, B., Yildirim, S. O., & Baykal, N. (2016). "Regulatory approaches for cyber security of critical infrastructures: The case of Turkey". Computer Law & Security Review, 32(3), 526-539.
- Hardman, O., Groat, S., Marchany, R., & Tront, J. (2013). "Optimizing a network layer moving target defense for specific system architectures". Paper presented at the Proceedings of the ninth ACM/IEEE Symposium on Architectures for Networking and Communications Systems.
- Joshi, B. K., Shrivastava, M. K., & Joshi, B. (2016). "Security Threats and Their Mitigation in Infrastructure as a Service". Perspectives in Science.
- Li, J., Feng, Z., Feng, Z., & Zhang, P. (2015). "A survey of security issues in cognitive radio networks". China Communications, 12(3), 132-150