1. Common criteria for information technology security evaluation, Version 3.1, Revision 5, April 2017. Available at https://www.commoncriteriaportal.org/cc/
2. Common Criteria Portal, November 12, 2010. http://www.commoncriteriaportal.org/products/stats. Internet Archive: https://web.archive.org/web/20100912145356/http://www.commoncriteriaportal.org/products/stats/. Retrieved April 01, 2022
3. Common Criteria Portal, March 9, 2022. http://www.commoncriteriaportal.org/products/stats. Internet Archive: https://web.archive.org/web/20220309101118/https://www.commoncriteriaportal.org/products/stats/. Retrieved April 01, 2022.
4. DoD trusted computer security evaluation criteria, Dod 5200.28-STD, December 1985
5. Heitmeyer C, Archer M, Leonard E, McLean J (2008) Applying formal methods to a certifiably secure software system. IEEE Trans Softw Eng 34(1):82–88