1. Ángel Mendoza, M., 2018. Vulnerabilities reached a historic peak in 2017. https://www.welivesecurity.com/2018/02/05/vulnerabilities-reached-historic-peak-2017/.
2. A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security;Arthur,2015
3. Quick Tutorial on TPM 2.0;Arthur,2015
4. ASArP: automated Security Assessment & Audit of Remote Platforms using TCG-SCAP Synergies;Aslam;J. Inf. Secur. Appl.,2015
5. Summary of the hipaa privacy rule;Assistance,2003