1. [1] Reporting Status of Vulnerability-related Information about Software Products and Websites, available from <https://www.ipa.go.jp/files/000094508.pdf>
2. [2] Vulnerability Disclosure Cheat Sheet, available from <https://cheatsheetseries.owasp.org/cheatsheets/Vulnerability_Disclosure_Cheat_Sheet.html>
3. [3] Allodi, L. and Massacci, F.: Comparing Vulnerability Severity and Exploits Using Case-Control Studies, ACM TOPS, Vol.17, No.1 (2014).
4. [4] Baah, G.K., Hobson, T., Okhravi, H., Roberts, S.C., Streilein, W.W. and Yuditskaya, S.C.: A Study of Gaps in Cyber Defense Automation, Technical Report, Defense Technical Information Center (2016).
5. [5] Baldoni, R., Coppa, E., D'elia, D.C., Demetrescu, C. and Finocchi, I.: A Survey of Symbolic Execution Techniques, ACM Comput. Surv., Vol.51, No.3 (2018).