1Laprie.J.C. Dependable Computing: Concepts, Challenges, Directions. Computer Software and Applications Conference. Proceedings of the 28th Annum International. 2004:242.
2Amoroso E G. Fundamentals of Computer Security Technology.Englewood Cliffs(New Jersey): Prentice Hail, 1994.
3Lindqvist U, Jonsson E. How to Systematically Classify Computer Security Intrusions. In: Proceedings of the 1997 IEEE Symposium on Security and Privacy, Oakland, CA, IEEE Computer Society Press,1997:154-163.
4Kendall K. A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems[Master Thesis]. Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, 1999.
5One A. Smashing the Stack for Fun and Profit. Phrack Magazine, 1996,7(49).
6Spyrit D, Jack A B. Win32 Buffer Overflows (Location, Exploitation and Prevention). Phrack Magazine, 2000, 55(I5).