1. CERT/CC. “Code Red Worm”, “Exploiting Buffer Overflow”, In IIS Indexing Service DLL. Advisory CA-2001-19, July 2001.
2. Dhiraj, G., Nilkanthrao, RSA Based Confidentiality And Integrity Enhancements in SCOSTA-CL, A thesis report, Department of Computer Science and Engineering, Indian Institute of Technology, Kanpur, India, (July, 2009).
3. Halfond, W. and Orso, A., AMNESIA: Analysis and Monitoring for Neutralizing SQL Injection Attacks, 20th IEEE/ACM international Conference on Automated Software Engineering, pp. 174--183. USA, New York, (2005).
4. J. Ullman, Database and knowledge base systems, In Database and knowledge base systems, Volume 2, Computer Science Press, 1989.
5. Akerkar RA and Sajja Priti Srinivas, “Knowledge-based systems”, Jones & Bartlett Publishers, Sudbury, MA, USA (2009).