1. Allan, D. (2008). Web application security: automated scanning versus manual penetration testing. IBM Rational Software, Somers, White Paper.
2. Anti-Subversion Software. (2019). https://en.wikipedia.org/wiki/Anti-Subversion_Software
3. Arthur, W. (2016). Control-Flow Security. https://web.eecs.umich.edu/~taustin/papers/Arthur_dissertation.pdf
4. One Technique is Not Enough: A Comparison of Vulnerability Discovery Techniques
5. Bowers, D. (2011). The Health Insurance Portability and Accountability Act: is it really all that bad? Accessed from https://www.ncbi.nlm.nih.gov/pmc/articles/PMC1305898/