1. M. Azahari, A. Ahmad, and S. B. Rahayu, TEST Eng. Manag. 81, 4774–4778 (2019).
2. L. Thaduri. Detecting Application Anomalies: Machine Learning Detecting Application Anomalies: Machine Learning Approach Approach. https://repository.stcloudstate.edu/msia_etds (20 May 2020).
3. Guarnieri, Marco et al. “Hardware-Software Contracts for Secure Speculation,” in 2021 IEEE Symposium on Security and Privacy (SP) (2021), pp. 1868–1883.
4. T. M. Hughes, “Autonomously and Responsibly Responding to Missing or Invalid SAS®Data Sets Through Exception Handling Routines,” in PharmaSUG Proceedings (2020).
5. D. Sahu and D. Tomar, Int. J. Adv. Comput. Networks Its Secur. 4, 71–75 (2014).