1. [1] A. V. Aho, R. Sethi, and J. D. Ullman. Compilers: Principles, Techniques and Tools. Addison-Wesley, 1985.
2. [2] K. R. Apt and E. Olderog. Verification of sequential and Concurrent Programs. Graduate Texts in Computer Science. Springer-Verlag, London, UK, second edition, 1997.
3. [3] D. L. Arendt, R. Burtner, D. M. Best, N. D. Bos, J. R. Gersh, C. D. Piatko, and C. L. Paul. Ocelot: user-centered design of a decision support visualization for network quarantine. In Visualization for Cyber Security (VizSec), 2015 IEEE Symposium on, pages 1-8, Oct 2015.
4. [4] L. Bai, E. R. Hancock, L. Han, and P. Ren. Graph clustering using graph entropy complexity traces. In Pattern Recognition (ICPR), 2012 21st International Conference on, pages 2881-2884, Nov 2012.
5. [5] L. Bai, E. R. Hancock, P. Ren, and F. Escolano. Directed depth-based complexity traces of hypergraphs from directed line graphs. In Pattern Recognition (ICPR), 2014 22nd International Conference on, pages 3874-3879, Aug 2014.