1. Alfred V. Aho , Monica S. Lam , Ravi Sethi , and Jeffrey D. Ullman . 2006 . Compilers: Principles, Techniques, and Tools ( 2 nd Edition). Addison-Wesley Longman Publishing Co., Inc. , USA. Alfred V. Aho, Monica S. Lam, Ravi Sethi, and Jeffrey D. Ullman. 2006. Compilers: Principles, Techniques, and Tools (2nd Edition). Addison-Wesley Longman Publishing Co., Inc., USA.
2. Miltiadis Allamanis , Marc Brockschmidt , and Mahmoud Khademi . 2017. Learning to Represent Programs with Graphs. CoRR abs/1711.00740 ( 2017 ). arxiv:1711.00740http://arxiv.org/abs/1711.00740 Miltiadis Allamanis, Marc Brockschmidt, and Mahmoud Khademi. 2017. Learning to Represent Programs with Graphs. CoRR abs/1711.00740 (2017). arxiv:1711.00740http://arxiv.org/abs/1711.00740
3. Daniel Arp , Erwin Quiring , Feargus Pendlebury , Alexander Warnecke , Fabio Pierazzi , Christian Wressnegger , Lorenzo Cavallaro , and Konrad Rieck . 2020. Dos and Don’ts of Machine Learning in Computer Security. CoRR abs/2010.09470 ( 2020 ). arxiv:2010.09470https://arxiv.org/abs/2010.09470 Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, and Konrad Rieck. 2020. Dos and Don’ts of Machine Learning in Computer Security. CoRR abs/2010.09470 (2020). arxiv:2010.09470https://arxiv.org/abs/2010.09470
4. Sindre Beba and Magnus Melseth Karlsen. 2019. Implementation Analysis of Open-Source Static Analysis Tools for Detecting Security Vulnerabilities. Sindre Beba and Magnus Melseth Karlsen. 2019. Implementation Analysis of Open-Source Static Analysis Tools for Detecting Security Vulnerabilities.