T. Gaddis, Starting out with Python, ISBN-13: 978-0134444321, Harlow, UK: Pearson, 2018.
 A. Sengupta, "Hardware Vulnerabilities and Their Effects on CE Devices: Design for Security against Trojans [Hardware Matters]," IEEE Consumer Electronics Magazine, vol. 6, no. 3, pp. 126-133, 2017.
 M. Alenezi, M. Zagane and Y. Javed, "Efficient Deep Features Learning for Vulnerability Detection Using Character N-gram Embedding," Jordanian Journal of Computers and Information Technology, vol. 7, no. 1, pp. 25-38, 2021.
 P. A. Wortman, F. Tehranipoor and J. A. Chandy, "Exploring the Coverage of Existing Hardware Vulnerabilities in Community Standards," Proc. of the Silicon Valley Cybersecurity Conference (SVCC2020), pp. 87-97, DOI:10.1007/978-3-030-72725-3_6, 2021.
 G. Bloom, E. Leontie, B. Narahari and R. Simha, "Hardware and Security: Vulnerabilities and Solutions," Chapter 12, pp. 305-331, Handbook on Securing Cyber-Physical Critical Infrastructure, Morgan Kaufmann, 2012.
 CVE, "Terminology," [Online], Available: https://cve.mitre.org/about/terminology.html, [Accessed: 27- Oct-2021].
 B. Martin, "Common Vulnerabilities Enumeration (CVE), Common Weakness Enumeration (CWE) and Common Quality Enumeration (CQE)," ACM SIGAda Ada Letters, vol. 38, no. 2, pp. 9-42, 2019.
 CWE, "Common Weakness Enumeration," [Online], Available: https://cwe.mitre.org/index.html, [Accessed: 28-Oct-2021].
 S. Bhunia and M. H. Tehranipoor, Hardware Security: A Hands-on Learning Approach, ISBN-13: 978- 0128124772, Cambridge, MA: Morgan Kaufmann Publishers, 2019.
 C. Li and J.-L. Gaudiot, "Detecting Malicious Attacks Exploiting Hardware Vulnerabilities Using Performance Counters," Proc. of the 43rd IEEE Annual Computer Software and Applications Conference (COMPSAC), pp. 588-597, DOI: 10.1109/COMPSAC.2019.00090, Milwaukee, WI, USA, 2019.
 M. Seaborn and T. Dullien, "Exploiting the DRAM Rowhammer Bug to Gain Kernel Privileges," Black Hat Briefings, pp. 1-71, [Online], Available: https://www.blackhat.com/docs/us-15/materials/us-15- Seaborn-Exploiting-The-DRAM-Rowhammer-Bug-To-Gain-Kernel-Privileges.pdf, 2015.
 E. Bosman, K. Razavi, H. Bos and C. Giuffrida, "Dedup Est Machina: Memory Deduplication As an Advanced Exploitation Vector," Proc. of the IEEE Symposium on Security and Privacy (SP), pp. 987- 1004, DOI 10.1109/SP.2016.63, San Jose, CA, USA, 2016.
 Y. Xiao, X. Zhang, Y. Zhang and R. Teodorescu, "One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation," Proc. of the 25th USENIX Security Symposium (USENIX Security 16), pp. 19-35, Austin, TX, USA, 2016.
 V. van der Veen, Y. Fratantonio, M. Lindorfer, D. Gruss, C. Maurice, G. Vigna, H. Bos, K. Razavi and C. Giuffrida, "Drammer: Deterministic Rowhammer Attacks on Mobile Platforms," Proc. of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1675-1689, DOI: 10.1145/2976749.2978406, 2016.
 K. Razavi, B. Gras, E. Bosman, B. Preneel, C. Giuffrida and H. Bos, "Flip Feng Shui: Hammering a Needle in the Software Stack," Proc. of the 25th USENIX Security Symposium (USENIX Security 16), pp. 1-18, Austin, TX, USA, 2016.
 A. Tatar, R. K. Konoth, E. Athanasopoulos, C. Giuffrida, H. Bos and K. Razavi, "Throwhammer: Rowhammer Attacks over the Network and Defenses," Proc. of the USENIX Annual Technical Conference (USENIX ATC 18), pp. 213-226, Boston, MA, USA, 2018.
 Y. Jang, J. Lee, S. Lee and T. Kim, "SGX-Bomb: Locking Down the Processor via Rowhammer Attack," Proc. of the 2nd Workshop on System Software for Trusted Execution, pp. 1-6, DOI: 10.1145/3152701.3152709, 2017.
 A. Ferraiuolo, R. Xu, D. Zhang, A. C. Myers and G. E. Suh, "Verification of a Practical Hardware Security Architecture through Static Information Flow Analysis," ACM SIGARCH Computer Architecture News, vol. 45, no. 1, pp. 555-568, 2017.
 T. Yaqoob, H. Abbas and M. Atiquzzaman, "Security Vulnerabilities, Attacks, Countermeasures and Regulations of Networked Medical Devices?A Review," IEEE Communications Surveys & Tutorials, vol. 21, no. 4, pp. 3723-3768, 2019.
 A. Stander and J. Ophoff, "Cyber Security in Civil Aviation," Imam Journal of Applied Sciences, vol. 1, no. 1, pp. 23-26, 2016.
 R. Albert and A.-L. Barabási, "Statistical Mechanics of Complex Networks," Reviews of Modern Physics, vol. 74, no. 1, pp. 47-97, 2002.  C. Li, Securing Computer Systems through Cyber Attack Detection at the Hardware Level, PhD Thesis, University of California, Irvine, 2020.
 Z. K. Younis and B. Mahmood, "Towards the Impact of Security Vulnerabilities in Software Design: A Complex Network-based Approach," Proc. of the 6th Int. Engineering Conf. “Sustainable Technology and Development" (IEC), pp. 157-162, DOI: 10.1109/IEC49899.2020.9122923, Erbil, Iraq, 2020.
 B. Mahmood, "Prioritizing CWE/SANS and OWASP Vulnerabilities: A Network-based Model," International Journal of Computing and Digital Systems, vol. 10, no. 1, pp. 361?372, 2021. 44 "An In-Depth Vision To Hardware Design Security Vulnerabilities", Z. Younis and B. Mahmood.
 S. Trecakov, C. Tran, H. Badawy, N. Siddique, J. Acosta and S. Misra, "Can Architecture Design Help Eliminate Some Common Vulnerabilities?" Proc. of the 14th IEEE Int. Conf. on Mobile Ad Hoc and Sensor Systems (MASS), pp. 590-593, DOI: 10.1109/MASS.2017.100, Orlando, FL, USA, 2017.
 C. Pilato, S. Garg, K. Wu, R. Karri and F. Regazzoni, "Securing Hardware Accelerators: A New Challenge for High-level Synthesis," IEEE Embedded Systems Letters, vol. 10, no. 3, pp. 77-80, 2018.
 J. Simonjan, S. Taurer and B. Dieber, "A Generalized Threat Model for Visual Sensor Networks," Sensors, vol. 20, no. 13, p. 3629, 2020.
 P. A. Wortman, F. Tehranipoor and J. A. Chandy, "Exploring the Coverage of Existing Hardware Vulnerabilities in Community Standards," Proc. of the Silicon Valley Cybersecurity Conference, Virtual, pp. 87-97, [Online], Available: https://svcc2020.svcsi.org/accepted-papers/Exploring-the-Coverage-of- Existing-Hardware-Vulnerabilities-in-Community-Standards, 2021.
 C. Bandi, S. Salehi, R. Hassan, S. M. P D, H. Homayoun and S. Rafatirad, "Ontology-driven Framework for Trend Analysis of Vulnerabilities and Impacts in IoT Hardware," Proc. of the 15th IEEE International Conference on Semantic Computing (ICSC), pp. 211-214, DOI: 10.1109/ICSC50631.2021.00045, Laguna Hills, CA, USA, 2021.
 S. Aftabjahani, R. Kastner, M. Tehranipoor, F. Farahmandi, J. Oberg, A. Nordstrom, N. Fern and A. Althoff, "Special Session: CAD for Hardware Security - Automation Is Key to Adoption of Solutions," Proc. of the 39th IEEE VLSI Test Symposium (VTS), pp. 1-10, DOI: 10.1109/VTS50974.2021.9441032, San Diego, CA, USA, 2021.
 J. Bellay, D. Forte, R. Martin and C. Taylor, "Hardware Vulnerability Description, Sharing and Reporting: Challenges and Opportunities," Proc. of Annual GOMACTech Conf., pp. 1-7, [Online], Available: http://dforte.ece.ufl.edu/wp-content/uploads/sites/65/2021/05/GOMACTech_conf.pdf, 2021.
 A. Clauset, C. R. Shalizi and M. E. J. Newman, "Power-law Distributions in Empirical Data," SIAM Review, vol. 51, no. 4, pp. 661-703, 2009.