7[7]A Bazaz,J D.Arthur.Towards A Taxonomy of Vulnerabilities.Proceedings of the 40th Annual Hawaii International Conference on System Sciences.IEEE Computer Society,Washington,DC,USA.2007.ISBN~ISSN:1530-1605,0-7695-2755-8.On page(s):163a-163a.
8[8]Bazaz A,Arthur,J D.Tront.J G.Modeling Security Vulnerabilities:A constraints and assumptions perspective.To be presented at IEEE International Symposium on Dependable,Autonomic and Secure Computing (DASC06),Indiana,2006.