1. Li Y, McCune JM, Perrig A (2011) VIPER: Verifying the integrity of peripherals’ firmware. In ACM Conference on Computer and Communications Security (CCS). ACM
2. P. Chen. Cyber security and privacy issues in smart grids;Liu J;IEEE Commun Surv Tutorials,2012
3. An Effective Heart Disease Prediction Model for a Clinical Decision Support System, in IEEE Access;Fitriyani NL,2020
4. Qu N, Zhou Z, Datta A, Gligor V, Perrig A (2010) TrustVisor: Efficient TCB reduction and attestation. In IEEE Symposium on Security and Privacy (S&P)
5. McKeen F, Alexandrovich I, Berenzon A, Rozas CV, Shafi H, Shanbhogue V (2013) Savagaonkar. Innovative instructions and software model for isolated execution. Hardware and Architectural Support for Security and Privacy (HASP). ACM