1. Software vulnerability markets: Discoverers and buyers;Algarni;International Journal of Computer, Electrical, Automation, Control, and Information Engineering,2014
2. Poster: Analysis of exploits in the wild – or: Do cybersecurity standards make sense?;Allodi,2013
3. Patch before exploited: An approach to identify targeted software vulnerabilities;Almukaynizi,2018
4. Window of vulnerability: A case study analysis;Arbaugh;Computer,2000