1. Adams, E. N. (1984). Optimizing preventive service of software products. IBM Journal of Research and Development, 28(1), 2–14.
2. Åkerholm, M., Land, R., & Strzyz, C. (2009). Can you afford not to certify your control system? iVTinternational http://www.ivtinternational.com/legislative_focus_nov.ph .
3. Andersson, J. (2005). Modeling the temporal behavior of complex embedded systems. Licentiate thesis, Mälardalen University, Sweden.
4. Anderson, P. (2008). Detecting bugs in safety-critical code. Dr Dobb’s Journal http://www.grammatech.com/products/codesonar/DrDobbsDetectingBugsInSafetyCriticalCode.pdf .
5. Antoniol, G., Penta, M. D., Masone, G., & Villano, U. (2003). XOgastan: XML-oriented gcc AST analysis and transformations. In 3rd IEEE international workshop on source code analysis and manipulation (SCAM’03) (pp. 173–182).