1. Mortada Al-Banna , Boualem Benatallah , Daniel Schlagwein , Moshe C Barukh , and Elisa Bertino . 2018 . Friendly Hackers to the Rescue: How Organizations Perceive Crowdsourced Vulnerability Discovery . In Pacific Asia Conference on Information Systems (PACIS). Mortada Al-Banna, Boualem Benatallah, Daniel Schlagwein, Moshe C Barukh, and Elisa Bertino. 2018. Friendly Hackers to the Rescue: How Organizations Perceive Crowdsourced Vulnerability Discovery. In Pacific Asia Conference on Information Systems (PACIS).
2. Software vulnerability markets: Discoverers and buyers. International Journal of Computer;Algarni Abdullah;Information Science and Engineering,2014
3. Abdullah M Algarni and Yashwant K Malaiya . 2013 . Most successful vulnerability discoverers: Motivation and methods . In Proceedings of the International Conference on Security and Management (SAM). The Steering Committee of The World Congress in Computer Science, Computer ..., 1. Abdullah M Algarni and Yashwant K Malaiya. 2013. Most successful vulnerability discoverers: Motivation and methods. In Proceedings of the International Conference on Security and Management (SAM). The Steering Committee of The World Congress in Computer Science, Computer ..., 1.
4. BSIMM. 2018 . BSIMM9: Building Security in Maturity Model version 9 . Retrieved December 18, 2019 from https://www.bsimm.com/download/ BSIMM. 2018. BSIMM9: Building Security in Maturity Model version 9. Retrieved December 18, 2019 from https://www.bsimm.com/download/
5. Bugcrowd. 2018 . Bugcrowd: State of bug bounties . Retrieved July 15, 2019 from https://www.bugcrowd.com/resources/reports/state-of-bug-bounty-2018/ Bugcrowd. 2018. Bugcrowd: State of bug bounties. Retrieved July 15, 2019 from https://www.bugcrowd.com/resources/reports/state-of-bug-bounty-2018/