1. O. Andersson, Threat, risk, and vulnerability analyses during the development of IT systems in the Swedish Armed Forces, Umeå University, 2010.
2. Y. Qasmaoui, Y. Maleh, H. Abdelkrim, Secure Software Defined Networks Controller Storage using Intel Software Guard Extensions, International Journal of Advanced Computer Science and Applications, Vol. 11, No. 10, 2020.
3. R. Aliyev, L. P. Herrero, Analyzing Vulnerability Databases, 10th IEEE International Conference on Application of Information and Communication Technologies, 2016. https://www.researchgate.net/publication/316 971384_Analyzing_Vulnerability_Data bases
4. F. D. Nembhard, M. M. Carvalho, T. C. Eskridge, Towards the application of recommender systems to secure coding, EURASIP Journal on Information Security, Vol. 9, 2019.
5. Red Hat Blog, Life-cycle of a Security Vulnerability, 2015. https://access.redhat.com/blogs/766093/posts/ 1976453