1. Arbaugh, W. A., Browne, H. K., McHugh, J., & Fithen, W. (2000a). A trend analysis of exploitations. University of Maryland working paper UMIACS-TR-2000-76.
2. Arbaugh, W. A., Fithen, W. L., & McHugh, J. (2000b). Windows of vulnerability: A case study analysis. IEEE Computer, 33 (December), 52–59.
3. Arora, A., Krishnan, R., Telang, R., & Yang, Y. (2005). An empirical analysis of vendor response to disclosure policy. The 4th annual workshop on economics of information security (WEIS05). Harvard University.
4. Arora, A., Telang, R., & Xu, H. (2004). Optimal policy for software vulnerability disclosure. The 3rd annual workshop on economics and information security (WEIS04). University of Minnesota.
5. Elias, L. (2001). Full disclosure is a necessary evil. SecurityFocus.com. http://www.securityfocus.com/news/238 .