1. Applying Bag of System Calls for Anomalous Behavior Detection of Applications in Linux Containers;Abed,2015
2. Alberts, C., Dorofee, A., Stevens, J., Woody, C., 2003. Introduction to the OCTAVE approach. Online. https://resources.sei.cmu.edu/asset_files/UsersGuide/2003_012_001_51556.pdf.
3. Can a DDos attack meltdown my data center? a simulation study and defense strategies;Anwar;IEEE Commun. Lett.,2014
4. AppViewX, 2019. All you need to know about securing your private keys. Online. https://www.appviewx.com/eguide/all-you-need-to-know-about-securing-your-private-keys/.
5. Improving cybersecurity hygiene through JIT patching;Araujo,2020