1. Alliance, T. C. P. (2000). Building A Foundation of Trust in the PC.
2. Amoroso, E. G. (1999). An Introduction to Intrusion Detection.
3. Biba, K. J. (1977). Integrity Considerations for Secure Computer Systems.
4. Ceccato, M., Ofek, Y., & Tonella, P. (2008). A Protocol for Property-Based Attestation. Theory and Practice of Computer Science, 7.
5. Property-Based Attestation without a Trusted Third Party