1. "NVD - Data Feeds" Nvd.nist.gov 2019. [Online]. Available: https://nvd.nist.gov/vuln/data-feeds. [Accessed: 06- Dec-2019]. "NVD - Data Feeds" Nvd.nist.gov 2019. [Online]. Available: https://nvd.nist.gov/vuln/data-feeds. [Accessed: 06- Dec-2019].
2. "CWE - CWE-1026: Weaknesses in OWASP Top Ten (2017) (3.4.1)" Cwe.mitre.org 2019. [Online]. Available: https://cwe.mitre.org/data/definitions/1026.html. [Accessed: 08- Dec- 2019]. "CWE - CWE-1026: Weaknesses in OWASP Top Ten (2017) (3.4.1)" Cwe.mitre.org 2019. [Online]. Available: https://cwe.mitre.org/data/definitions/1026.html. [Accessed: 08- Dec- 2019].
3. M. Sridhar M. Chirva B. Ferrell K. Hamlen2 and D. Karamchandani2 "FLASH IN THE DARK: ILLUMINATING THE LANDSCAPE OF ACTIONSCRIPT WEB SECURITY TRENDS AND THREATS" Utdallas.edu 2019. [Online]. Available: http://www.utdallas.edu/~hamlen/sridhar17jissec.pdf. [Accessed: 08- Dec- 2019]. M. Sridhar M. Chirva B. Ferrell K. Hamlen2 and D. Karamchandani2 "FLASH IN THE DARK: ILLUMINATING THE LANDSCAPE OF ACTIONSCRIPT WEB SECURITY TRENDS AND THREATS" Utdallas.edu 2019. [Online]. Available: http://www.utdallas.edu/~hamlen/sridhar17jissec.pdf. [Accessed: 08- Dec- 2019].
4. Network-based detection of Android malicious apps