10Annaert, Jan, De Ceuster, Marc J.K., Polfliet, Ruud and Van Campenhout, Geert. 2002. To Be or Not Be & 'Too Late': The Case of the Belgian Semi-annual Earnings Announcements. Journal of Business Finance & Accounting, 29:477-495.
6Howard M, LeBlanc D, Viega J. 19 Deadly Sins of Software Security: Programming Flaws and How to Fix Them. USA.. McGraw-Hill Osborne Media, 2005
7Sutton M, Greene A, Amini P. Fuzzing, Brute Force Vulnerability Discovery. USA: Addison-Wesley Professional, 2007
8Chess B, West J. Secure Programming with Static Analysis. USA: Addison Wesley Professional, 2007
9Chess B, McGraw G. Static analysis for security. IEEE Security: Privacy Magazine, 2004, 2(6): 76-79
10Johnson R, Wagner D. Finding user/kernel pointer bugs with type inference//Proceedings of the 2004 USENIX Security Symposium. San Diego, CA, USA, 2004:119-134