1. Symantec A-Z listing of threats & risks (2014). http://www.symantec.com/security response/landing/azlisting.jsp. Accessed 26 Dec 2018
2. Symantec attack signatures (2014). http://www.symantec.com/ security_response/attacksignatures/. Accessed 26 Dec 2019
3. Annual cybersecurity report (2016). http://www.ntt.co.jp/sc/media/NTTannual2016_e_web_lock.pdf. Accessed 11 Nov 2019
4. Buffer overflow (2018). http://projects.webappsec.org/w/page/13246916/Buffer%20Overflow/. Accessed 28 Dec 2019
5. National vulnerability dataset (2018). https://nvd.nist.gov/