Send me your references using the following format, which is the standard format for Computer Science references:
Conference proceeding: Author List. Title. In Proceedings of the Conference Name, Conference Location, Month and Year of Conference, Page Numbers. Journal proceeding: Author List. Title. Journal Name, Volume Number, Issue Number, Page Numbers, Month and Year Published. Book: Author List. Title. Publisher, Year Published. Online article: Author List. Title. [Online] URL, Date Retrieved.Examples of each reference style:
S. Jha, O. Sheyner, and J. Wing. Two Formal Analyses of Attack Graphs. In Proceedings of the IEEE Computer Security Foundations Workshop, Cape Brenton, Nova Scotia, Canada, June 2002, pp 49-63. C.E. Landwehr, A.R. Bull, J.P. McDermott, and W.S. Choi. A Taxonomy of Computer Program Security Flaws. ACM Computing Surveys, vol. 26, no. 3, pp 211-254, September 1994. E. Friedman-Hill. JESS in Action. Manning Publications Company, 2003. MIT Press Release. MIT Lincoln Laboratory software aims to thwart cyber hackers. [Online] http://web.mit.edu/newsoffice/2008/security-0827.html, August 2008.For each reference, also provide a brief description (1 paragraph) of the contents of that reference.