1. National Technology Laboratory: National Vulnerability Database (NVD). NVD Data Feeds.
https://nvd.nist.gov/vuln/data-feeds
. Accessed 20 April 2019
2. Sood, A.K., Enbody, R.J., Bansal, R.: Dissecting spyeye – understanding the design of third generation botnets. Comput. Netw. 57(2), 436–450 (2013)
3. iZOOlogic: Top 4 Malware – Financial Trojans – Zeus, Carberp, Citadel and SpyEye (2016).
https://www.izoologic.com/2016/10/15/top-4-malware-financial-trojans-zeus-carberp-citadel-and-spyeye/
. Accessed 20 April 2019
4. Lecture Notes in Computer Science;G Serazzi,2004
5. Valler, N.C.: Spreading Processes on Networks: Theory and Applications. University of California Riverside (2012)
https://escholarship.org/uc/item/6r76d0rg
. Accessed 19 April 2019