1. Localizing firewall security policies;Adao,2016
2. Computer Security Technology Planning Study;Anderson,1972
3. Microservices made attack-resilient using unsupervised service fissioning;Baarzi,2020
4. Semantic-based automated reasoning for AWS access policies using SMT;Backes;Proc. FMCAD ’19,2019
5. A novel approach to secure microservice architecture from OWASP vulnerabilities;Baker,2019