1. National Vulnerability Database, “CVSS Severity Distribution Over Time,” Annual report of NIST, Last updated January 2016
2. Nisch, P.: Security Issues in Modern Automotive Systems (2012).
http://www.panisch.com
3. Koscher, K.: Securing embedded systems: analyses of modern automotive systems and enabling near-real time dynamic analysis. Doctor of Philosophy Thesis, University of Washington (2014)
4. Dingledine, R., Mathewson, N., Syverson, N.: Tor: the second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (2004)
5. Nia, M.A., Babulak, E., Fabian, B., Atani, R.E.: An analytical perspective to traffic engineering in anonymous communication systems. In: Progress in Computer Sciences and Information Technology International Conference, Malaysia, pp. 1–6 (2016)