1. Nicolas Anquetil and Timothy C Lethbridge. 1999. Experiments with clustering as a software remodularization method. In Sixth Working Conference on Reverse Engineering (Cat. No. PR00303). IEEE, 235--255.
2. Karin Bernsmed and Martin Gilje Jaatun. 2019. Threat modelling and agile software development: identified practice in four norwegian organisations. In 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). IEEE, 1--8.
3. Dan Boxler and Kristen R Walcott. 2018. Static taint analysis tools to detect information flows. In Proceedings of the International Conference on Software Engineering Research and Practice (SERP). The Steering Committee of The World Congress in Computer Science, Computer ..., 46--52.
4. A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
5. The Matter of Heartbleed