1. ]Martin Abadi, Mihai Budui, Ulfar Erlingsson, Jay Ligatti: Control-Flow Integrity ‒ Principles, Implementations, and Applications ACM Transactions on Information System Security, Vol. 13, 2009, pp. 1–40. Downloadable from: https://www.cse.usf.edu/~ligatti/papers/cfi-tissec.pdf [Last accessed: 23.7.2021]
2. Ahmed Abd-Allah: Extending Reliability Block Diagrams to Software Architectures Technical Report: USC-CSE-97-501, University of Southern California, Los Angeles, CA, USA, 1997. Downloadable from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.365.9394&rep=rep1&type=pdf [Last accessed: 3.10.2021]
3. Pranay Ahlawat, Johannes Boyne, Dominik Herz, Florian Schmieg, Michael Stephan: Why You Need an Open Source Software Strategy BCG (Boston Consulting Group), Boston, MA, USA, April 16, 2021. Accessible at: https://www.bcg.com/publications/2021/open-source-software-strategy-benefits [Last accessed: 22.6.2021]
4. Ilyas Akbari: The Fate of Sriwijaya Air Flight 182: A Reminder of Aviation Safety Jurist – Legal News & Commentary, University of Pittsburgh, Pittsburgh, PA, USA, February 24, 2021. Downloadable from: https://www.jurist.org/commentary/2021/02/ilyas-akbari-sriwijaya-182-aviation-safety/ [last accessed 15.7.2021]
5. Will Arthur, David Challener: A Practical Guide to TPM 2.0 ‒ Using the Trusted Platform Module in the New Age of Security Apress Media, LLC, New York, NY, USA, 2015. ISBN 978-1-4302-6583-2. Downloadable from (Apress Open): https://www.springer.com/de/book/9781430265832 [last accessed: 25.10.2021]