1. An automated framework for managing security vulnerabilities
2. Andress, M. (2004), “Network vulnerability assessment management”,Network World, November 8.
3. Core Security (2011),Core Impact, available at: www.coresecurity.com (accessed February 13, 2011).
4. Critical Watch (2011),FusionVM, available at: www.criticalwatch.com/products/vulnerability‐management‐overview.aspx.
5. Why Johnny Can’t Pentest: An Analysis of Black-Box Web Vulnerability Scanners