1. 2022. Ivanti. Retrieved February 17 2022 from https://www.ivanti.com/ 2022. Ivanti. Retrieved February 17 2022 from https://www.ivanti.com/
2. A. Al-Ayed S.M. Furnell D. Zhao and P.S. Dowland. 2005. An automated framework for managing security vulnerabilities. Information management & computer security 13 2 (2005) 156-166. https://doi.org/10.1108/09685220510589334 10.1108/09685220510589334
3. A. Al-Ayed S.M. Furnell D. Zhao and P.S. Dowland. 2005. An automated framework for managing security vulnerabilities. Information management & computer security 13 2 (2005) 156-166. https://doi.org/10.1108/09685220510589334
4. Saleema Amershi , Dan Weld , Mihaela Vorvoreanu , Adam Fourney , Besmira Nushi , Penny Collisson , Jina Suh , Shamsi Iqbal , Paul N. Bennett , Kori Inkpen , Jaime Teevan , Ruth Kikin-Gil , and Eric Horvitz . 2019 . Guidelines for Human-AI Interaction. In CHI Conference on Human Factors in Computing Systems Proceedings (CHI 2019). ACM, New York, NY, USA, 1–13. https://doi.org/10.1145/3290605.3300233 10.1145/3290605.3300233 Saleema Amershi, Dan Weld, Mihaela Vorvoreanu, Adam Fourney, Besmira Nushi, Penny Collisson, Jina Suh, Shamsi Iqbal, Paul N. Bennett, Kori Inkpen, Jaime Teevan, Ruth Kikin-Gil, and Eric Horvitz. 2019. Guidelines for Human-AI Interaction. In CHI Conference on Human Factors in Computing Systems Proceedings (CHI 2019). ACM, New York, NY, USA, 1–13. https://doi.org/10.1145/3290605.3300233
5. Marco Angelini , Graziano Blasilli , Tiziana Catarci , Simone Lenti , and Giuseppe Santucci . 2018 . Vulnus: Visual vulnerability analysis for network security . IEEE transactions on visualization and computer graphics 25, 1(2018), 183–192. Marco Angelini, Graziano Blasilli, Tiziana Catarci, Simone Lenti, and Giuseppe Santucci. 2018. Vulnus: Visual vulnerability analysis for network security. IEEE transactions on visualization and computer graphics 25, 1(2018), 183–192.