1. HW-CDI: Hard-Wired Control Data Integrity
2. Hu. Xinwen , Yi. Zhuang , Cao. Zining, Ye. Tong , and L. Mi , “ Modeling and validation for embedded software confidentiality and integrity ,” in 12th International Conference on Intelligent Systems and Knowledge Engineering (ISKE) , Nanjing, China , January 2018 , pp. 1 - 6 . Hu. Xinwen, Yi. Zhuang, Cao. Zining, Ye. Tong, and L. Mi, “Modeling and validation for embedded software confidentiality and integrity,” in 12th International Conference on Intelligent Systems and Knowledge Engineering (ISKE), Nanjing, China, January 2018, pp. 1-6.
3. Lightweight Named Object: an ICN-based Abstraction for IoT Device Programming and Management;Bracciale L.;IEEE Internet of Things Journal,2019
4. The practice of secure software development in SDLC: an investigation through existing model and a case study
5. Large-Scale Empirical Study of Important Features Indicative of Discovered Vulnerabilities to Assess Application Security;Zhang M.;IEEE Transactions on Information Forensics and Security,2019