1. Cohen, F.: Computer viruses theory and experiments. Comput. Secur. 6(1), 22–35 (1987)
2. Alizar, A.: HP Information Security Report 2013. http://xakep.ru/2014/02/04/61990/
3. McAfee LLC. McAfee Labs Threats Report. https://www.mcafee.com/enterprise/en-us/assets/reports/rp-quarterly-threats-dec-2018.pdf
4. International Telecommunication Union: Security in Telecommunications and Information Technology. https://www.itu.int/dms_pub/itu-t/opb/tut/T-TUT-SEC-2015-PDF-E.pdf
5. CyberEdge Group LLC: Report Defense Cyberthreat (2018). https://cyber-edge.com/wp-content/uploads/2018/03/CyberEdge-2018-CDR.pdf