1. Avizienis, A., Laprie, J. C., Randell, B., & Landwehr, C. (2004). Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 1(1), 11–33.
2. Bar-Yam, Y. (2019). Dynamics of complex systems. Cambridge: CRC Press.
3. Dessouky, G., Gens, D., Haney, P., Persyn, G., Kanuparthi, A., & Khattri, H., et al. (2019). Hardfails: insights into software-exploitable hardware bugs. In: Proceedings of 28th USENIX Security Symposium, Santa Clara, California, USA (pp. 213–230).
4. Evtyushkin, D., Riley, R., Abu-Ghazaleh, N. C. A. E., & Ponomarev, D. (2018). Branchscope: A new side-channel attack on directional branch predictor. ACM SIGPLAN Notices, 53(2), 693–707.
5. Ferraiuolo, A., Xu, R., Zhang, D., Myers, A. C., & Suh, G. E. (2017). Verification of a practical hardware security architecture through static information flow analysis. In: Proceedings of the twenty-second international conference on architectural support for programming languages and operating systems, Xi’an, China (pp. 555–568).