1. An evolutionary testing approach to detect buffer overflow;Del Grosso,2004
2. Improving network applications security;Del Grosso,2005
3. Coello C. A short tutorial on evolutionary multiobjective optimization. In: Zitzler E, Deb K, Thiele L, Coello CAC, Corne D, editors. First international conference on evolutionary multi-criterion optimization. Lecture notes in computer science, vol. 1993. Berlin: Springer; 2001. p. 21–40. URL: 〈citeseer.ist.psu.edu/coellocoello01short.html〉.
4. Viega J, Bloch J, Kohno T, McGraw G. ITS4: a static vulnerability scanner for c and c++ code. In: Proceedings of the 16th annual computer security applications conference; 2000. p. 3–17.
5. Secure software solutions, rats, the rough auditing tool for security, 〈http://www.securesw.com/rats/〉. URL: 〈http://www.securesw.com/rats/〉.