1. Spafford, E. H. (1989). Crisis and aftermath. Communications of the ACM, 32(6), 678–687.
2. One, Aleph. (1996). Smashing the stack for fun and profit. Phrack Magazine, 7(49), 14–16.
3. Butt, M. A., Ajmal, Z., Khan, Z. I., Idrees, M., & Javed, Y. (2022). An in-depth survey of bypassing buffer overflow mitigation techniques. Applied Sciences, 12, 6702.
4. Kaur, J., & Garg, U. (2022). State-of-the-art survey on web vulnerabilities, threat vectors, and countermeasures, 3–17. Springer Singapore.
5. Di Zio, M., et al. (2016). Methodology for data validation 1.0. Essnet Validat Foundation.