1. Aho, A.V., Sethi, R., and Ullman, J.D., Compilers: Principles, Techniques, and Tools, Reading, MA: Addison Wesley, 1984.
2. Gamayunov, D.Yu., Gornak, T.A., Sapozhnikov, A.V., Sakharov, F.V., and Toroshchin, E.S., Granular Monitoring of the Security of Application Behavior by Linux Kernel, INSIDE, Inf. Bezop., 2010, pp. 54–58.
3. Smelyanskii, R.L., Mathematical Model of the Operation of Distributed Computing Networks, Vestn. Mosk. Gos. Univ., 1990.
4. Shalimov, A.V., Method for Estimating the Execution Frequency of Code Fragments of a Sequential Program, Model. Anal. Inf. Syst., 2010, vol. 17, no. 2, pp. 122–132.
5. Smelyanskii, R.L. and Gamayunov, D.Yu., A Model of the Behavior of Network Objects in Distributed Computer Systems, Programming Comput. Software, 2007, vol. 33, no. 4, pp. 195–203.