1. A.I. Belous, V.A. Solodukha, S.V. Shvedov, Software and Hardware Trojans—Methods of Implementation and Methods of Counteraction. The First Technical Encyclopedia, vol. 2 (TECHNOSPHERE, Moscow, 2018), p. 688. ISBN 978-5-94836-524-4
2. Distructive duty factor actions.
http://sp.sz.ru/rps_.html
3. V. Sidorov, What Trojans does Alxnis frighten us of? Is it true that all of the Windows are closely watched not only by Microsoft but also by the CIA and the Pentagon?
http://netler.ru/pc/bookmark.htm
4. A. Markov, S. Mironov, V. Tsirlov, Detection of vulnerabilities in the program code.
http://www.osp.ru/text/print/302/380655.html
5. Y.F. Katorin, E.V. Kurenkov, A.V. Lysov, A.N. Ostapenko, Great Encyclopedia Of Industrial Espionage (SPb.: OOO Publishing House Polygon, 2000), p. 896