1. Prashant Anantharaman, J Peter Brady, Ira Ray Jenkins, Vijay H Kothari, Michael C Millian, Kartik Palani, Kirti V Rathore, Jason Reeves, Rebecca Shapiro, Syed H Tanveer, 2020. Intent as a secure design primitive. In Modeling and Design of Secure Internet of Things, First Edition, Charles A. Kamhoua, Laurent L. Njilla, Alexander Kott, and Sachin Shetty (Eds.). John Wiley and Sons, Inc., New York, NY, Chapter 10, 528–562.
2. Sergey Bratus. 2015. LANGSEC: Language-theoretic Security. https://www.cs.dartmouth.edu/ sergey/langsec/. Accessed: 2024-01-10.
3. Sergey Bratus, ME Locasto, and ML Patterson. 2011. Exploit programming: From buffer overflows to “weird machines” and theory of computation. SECURITY ;login 36 (2011), 1–9. Issue 6.
4. Sergey Bratus and Anna Shubina. 2017. Exploitation as code reuse: On the need of formalization. it-Information Technology 59, 2 (2017), 93–100.
5. MITRE Corporation. 2014. Common Weakness Scoring System (CWSS™). https://cwe.mitre.org/cwss/cwss_v1.0.1.html. Accessed: 2024-01-10.