1. C. P. Pfleeger and S. L. Pfleeger, Security in computing. Prentice Hall Professional Technical Reference, 2002.
2. Wannacry, cybersecurity and health information technology: A time to act;J. M. Ehrenfeld;Journal of medical systems,2017
3. R. B. Security, “More than 10,000 vulnerabilities disclosed so far in 2018–over 3,000 you may not know about.” https://www.riskbasedsecurity.com/2018/08/more-than-10000-vulnerabilities-disclosed-so-far-in-2018-over-3000-you-may-not-know-about/. Lasted accessed February 16, 2019.
4. M. Macdonald, R. Frank, J. Mei, and B. Monk, “Identifying digital threats in a hacker web forum,” in 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 926–933, IEEE, 2015.
5. L. Bilge and T. Dumitraş, “Before we knew it: an empirical study of zero-day attacks in the real world,” in Proceedings of the 2012 ACM conference on Computer and communications security, pp. 833–844, ACM, 2012.