1. AIDE - Advanced Intrusion Detection Environment, available on-line at https://github.com/aide/aide. Accessed 7 July 2020
2. Anderson, R.: Security engineering: A Guide to Building Dependable Distributed Systems, 3rd edn. Wiley, Indianapolis, Indiana (2020)
3. Antunes, N., Vieira, M.: Defending against web application vulnerabilities. Computer 45(2), 66–72 (2012)
4. Article 29 Data Protection Working Party. Guidelines on the application and setting of administrative fines for the purposes of the Regulation 2016/679. http://ec.europa.eu/newsroom/just/document.cfm?doc_id=47889. Accessed 7 July 2020
5. Article 29 working party. guidelines on consent under regulation 2016/679 (wp259rev.01). https://ec.europa.eu/newsroom/article29/document.cfm?action=display&doc_id=51030. Accessed 7 July 2020