1. Hassan, W.U. , Bates , A. and Marino , D ., 2020, May. "Tactical provenance analysis for endpoint detection and response systems ", In 2020 IEEE Symposium on Security and Privacy (SP) (pp. 1172--1189) . IEEE. Hassan, W.U., Bates, A. and Marino, D., 2020, May. "Tactical provenance analysis for endpoint detection and response systems", In 2020 IEEE Symposium on Security and Privacy (SP) (pp. 1172--1189). IEEE.
2. Rose, Scott W., Oliver Borchert , Stuart Mitchell , and Sean Connelly , " Zero Trust Architecture ." ( 2020 ). NIST Special Publication 800--207 . Rose, Scott W., Oliver Borchert, Stuart Mitchell, and Sean Connelly, "Zero Trust Architecture." (2020). NIST Special Publication 800--207.
3. Kamvar, S.D. , Schlosser , M.T. and Garcia-Molina , H ., 2003, May. "The eigentrust algorithm for reputation management in p2p networks ", 12th international conference on World Wide Web (pp. 640--651) . Kamvar, S.D., Schlosser, M.T. and Garcia-Molina, H., 2003, May. "The eigentrust algorithm for reputation management in p2p networks", 12th international conference on World Wide Web (pp. 640--651).
4. Securing ad hoc networks
5. T.M. Cover J.A. Thomas "Elements of Information Theory" John Wiley & Sons Inc. 2004. T.M. Cover J.A. Thomas "Elements of Information Theory" John Wiley & Sons Inc. 2004.