1. Coders’ Rights Project Vulnerability Reporting FAQ. https://www.eff.org/issues/coders/ vulnerability-reporting-faq. Accessed: 2016-04-03. Coders’ Rights Project Vulnerability Reporting FAQ. https://www.eff.org/issues/coders/ vulnerability-reporting-faq. Accessed: 2016-04-03.
2. Common Vulnerability Scoring System (CVSS-SIG). https://www.first.org/cvss. Accessed: 2016-03-12. Common Vulnerability Scoring System (CVSS-SIG). https://www.first.org/cvss. Accessed: 2016-03-12.
3. Severity Ratings - Red Hat Customer Portal. https://access.redhat.com/security/updates/ classification. Accessed: 2016-08-14. Severity Ratings - Red Hat Customer Portal. https://access.redhat.com/security/updates/ classification. Accessed: 2016-08-14.
4. IEEE Standard Classification for Software Anomalies. IEEE Std 1044-2009 (Revision of IEEE Std 1044-1993) pages 1–25 Jan 2010. IEEE Standard Classification for Software Anomalies. IEEE Std 1044-2009 (Revision of IEEE Std 1044-1993) pages 1–25 Jan 2010.
5. Software Vulnerability Markets: Discoverers and Buyers. Int. Journal Computer, Information;Algarni A.;Systems and Control Engineering,2014