1. L. Gong M. Mueller H. Prafullchandra and R. Schemers "Going beyond the sandbox: An overview of the new security architecture in the Java Development Kit 1.2. " in USENIX Symposium on Internet Technologies and Systems pp. 103--112 1997. L. Gong M. Mueller H. Prafullchandra and R. Schemers "Going beyond the sandbox: An overview of the new security architecture in the Java Development Kit 1.2. " in USENIX Symposium on Internet Technologies and Systems pp. 103--112 1997.
2. IBM Security Systems "IBM X-Force threat intelligence report." http://www.ibm.com/security/xforce/ February 2014. IBM Security Systems "IBM X-Force threat intelligence report." http://www.ibm.com/security/xforce/ February 2014.
3. L. Garber "Have Java's Security Issues Gotten out of Hand? " in 2012 IEEE Technology News pp. 18--21 2012. 10.1109/MC.2012.411 L. Garber "Have Java's Security Issues Gotten out of Hand? " in 2012 IEEE Technology News pp. 18--21 2012. 10.1109/MC.2012.411
4. A. Singh and S. Kapoor "Get Set Null Java Security." http://www.fireeye.com/blog/technical/2013/06/get-set-null-java-security.html June 2013. A. Singh and S. Kapoor "Get Set Null Java Security." http://www.fireeye.com/blog/technical/2013/06/get-set-null-java-security.html June 2013.