1. Nicholas Boucher and Ross Anderson . 2021 . Trojan Source: Invisible Vulnerabilities. Preprint. https://arxiv.org/abs/2111.00169 arXiv: 2111.00169 [cs.CR]. Nicholas Boucher and Ross Anderson. 2021. Trojan Source: Invisible Vulnerabilities. Preprint. https://arxiv.org/abs/2111.00169 arXiv: 2111.00169 [cs.CR].
2. The Apache Software Foundation . 2021 . Apache Log4j Security Vulnerabilities . The Apache Software Foundation, (Dec. 2021). https://logging.apache.org/log4 j/2.x/security.html. The Apache Software Foundation. 2021. Apache Log4j Security Vulnerabilities. The Apache Software Foundation, (Dec. 2021). https://logging.apache.org/log4 j/2.x/security.html.
3. S. Peisert et al. 2021. Perspectives on the solarwinds incident. IEEE Security & Privacy 19 02 (Mar. 2021) 7--13. doi: 10.1109/MSEC.2021.3051235. 10.1109/MSEC.2021.3051235
4. S. Peisert et al. 2021. Perspectives on the solarwinds incident. IEEE Security & Privacy 19 02 (Mar. 2021) 7--13. doi: 10.1109/MSEC.2021.3051235.
5. Joseph Biden . 2021. Executive Order on Improving the Nation's Cybersecurity. en-US. Executive Order 14028. (May 2021 ). Retrieved July 5, 2021 from https: //www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/exec utive-order-on-improving-the-nations-cybersecurity. Joseph Biden. 2021. Executive Order on Improving the Nation's Cybersecurity. en-US. Executive Order 14028. (May 2021). Retrieved July 5, 2021 from https: //www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/exec utive-order-on-improving-the-nations-cybersecurity.