1. Absinthe. (2007). Retrieved from http://www.security-database.com/toolswatch/Absinthe-1-4-1-available.html.
2. Ahluwalia, K. S. (2007). Scalability Design Patterns. In Proceedings of 14th Pattern Languages of Programs (PLoP 2007)
3. Bialkowski., et al. (2004). Application Vulnerability Description Language v1.0, OASIS Standard. Reference from http://www.oasis-open.org
4. BSQLHacker. (n.d.). Reference from http://labs.portcullis.co.uk/application/bsql-hacker/.
5. Checkstyle.(2001-2010) Reference from http://checkstyle.sourceforge.net/.