1. Abandon, I. C. (2013, 9 26). Blackhole exploit kit spam runs: A threat vortex? Retrieved June 10, 2020, from TrendMicro: https://www.trendmicro.com/vinfo/us/threat-encyclopedia/web-attack/128/blackhole-exploit-kit-spam-runs-a-threat-vortex
2. Alperovich, D. (2018, November 13). 10 Cyber Myths. 2018 CyCon keynote. Washington, DC, USA.
3. Amazon Web Services (AWS). (n.d.). Amazon AWS GovCloud Glossary. Retrieved June 8, 2020, from https://docs.aws.amazon.com/govcloud-us/latest/UserGuide/glossary.html
4. Amoroso, E. (2011). Cyber attacks: Protecting National Infrastructure. Elsevier.
5. Ana Nora Sovarel, D. E. (2005). Where's the FEEB? The effectiveness of instruction set randomization. In SSYM'05: Proceedings of the 14th conference on USENIX Security (p. 10). USENIX.