1. {n. d.}. Bug in OpenSSL opens two-thirds of the Web to eavesdropping. ({n. d.}). http://arstechnica.com/security/2014/04/critical-crypto-bug-in-opensslopens-two-thirds-of-the-web-to-eavesdropping/ {n. d.}. Bug in OpenSSL opens two-thirds of the Web to eavesdropping. ({n. d.}). http://arstechnica.com/security/2014/04/critical-crypto-bug-in-opensslopens-two-thirds-of-the-web-to-eavesdropping/
2. {n. d.}. Definition of vulnerability. ({n. d.}). https://cve.mitre.org/about/ terminology.html {n. d.}. Definition of vulnerability. ({n. d.}). https://cve.mitre.org/about/ terminology.html
3. {n. d.}. Heartbleed Home Page. ({n. d.}). http://heartbleed.com {n. d.}. Heartbleed Home Page. ({n. d.}). http://heartbleed.com
4. {n. d.}. NATIONAL VULNERABILITY DATABASE. ({n. d.}). https://nvd.nist.gov/ {n. d.}. NATIONAL VULNERABILITY DATABASE. ({n. d.}). https://nvd.nist.gov/
5. {n. d.}. Weka: Data Mining Software in Java. ({n. d.}). http://www.cs.waikato.ac. nz/ml/weka/ {n. d.}. Weka: Data Mining Software in Java. ({n. d.}). http://www.cs.waikato.ac. nz/ml/weka/