1. 2021. C to rust translation refactoring and cross-checking. https://c2rust.com/ 2021. C to rust translation refactoring and cross-checking. https://c2rust.com/
2. NH Bingham . 1996. The sample mid-range and interquartiles. Statistics & probability letters, 27, 2 ( 1996 ), 131–136. NH Bingham. 1996. The sample mid-range and interquartiles. Statistics & probability letters, 27, 2 (1996), 131–136.
3. BlueHat. 2019. Memory corruption is still the most prevalent security vulnerability. https://www.zdnet.com/article/microsoft-70-percent-of-all-security-bugs-are-memory-safety-issues/ Accessed: 2020-02-11. BlueHat. 2019. Memory corruption is still the most prevalent security vulnerability. https://www.zdnet.com/article/microsoft-70-percent-of-all-security-bugs-are-memory-safety-issues/ Accessed: 2020-02-11.
4. Garbage collection in an uncooperative environment
5. Dependent Types for Low-Level Programming